Investigating the usage of the Chinese wall security policy model for data mining

  • Authors:
  • M. Loock;Jan H. P. Eloff

  • Affiliations:
  • University of South Africa, Unisa, Pretoria, South Africa;University of Pretoria, Pretoria, South Africa

  • Venue:
  • WISICT '05 Proceedings of the 4th international symposium on Information and communication technologies
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Access control requirements for the protection of information/data objects in an information system environment are well defined and successfully implemented by means of access control policies and models. Whenever these objects are used in a data-mining environment, a change in the access control requirements becomes necessary. During a data-mining activity the data miner may expose unexpected results or trends. It is important for all companies involved in data-mining activities to be aware of these potential access control problems.Brewer and Nash (1989) first defined the Chinese Wall Security Policy model (CWSP model). It provides access control for the commercial environment based on conflict of interest classes. Shortly after the introduction of this model, Lin (1989) reported an error in it and presented a modified version called the Aggressive Chinese Wall Security Policy model (ACWSP model). This model introduced the concept of an overlap between conflict of interest classes. It became evident that these two models had the potential to be used in a data-mining environment.