{"id":"https://openalex.org/W1991666422","doi":"https://doi.org/10.1145/2462410.2462425","title":"Least-restrictive enforcement of the Chinese wall security policy","display_name":"Least-restrictive enforcement of the Chinese wall security policy","publication_year":2013,"publication_date":"2013-06-05","ids":{"openalex":"https://openalex.org/W1991666422","doi":"https://doi.org/10.1145/2462410.2462425","mag":"1991666422"},"language":"en","primary_location":{"id":"doi:10.1145/2462410.2462425","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2462410.2462425","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 18th ACM symposium on Access control models and technologies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089848354","display_name":"Alireza Sharifi","orcid":"https://orcid.org/0000-0001-7110-7516"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Alireza Sharifi","raw_affiliation_strings":["University of Waterloo, Waterloo, ON, Canada"],"affiliations":[{"raw_affiliation_string":"University of Waterloo, Waterloo, ON, Canada","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081788400","display_name":"Mahesh Tripunitara","orcid":"https://orcid.org/0000-0002-3615-9393"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Mahesh V. Tripunitara","raw_affiliation_strings":["University of Waterloo, Waterloo, ON, Canada"],"affiliations":[{"raw_affiliation_string":"University of Waterloo, Waterloo, ON, Canada","institution_ids":["https://openalex.org/I151746483"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5089848354"],"corresponding_institution_ids":["https://openalex.org/I151746483"],"apc_list":null,"apc_paid":null,"fwci":4.3283,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.94085675,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"61","last_page":"72"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.8027976751327515},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6069017052650452},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5943898558616638},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5758470296859741},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5451521277427673},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.5230677723884583},{"id":"https://openalex.org/keywords/nash-equilibrium","display_name":"Nash equilibrium","score":0.43389618396759033},{"id":"https://openalex.org/keywords/law-enforcement","display_name":"Law enforcement","score":0.431270956993103},{"id":"https://openalex.org/keywords/law-and-economics","display_name":"Law and economics","score":0.381268173456192},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.19053232669830322},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.17226091027259827},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.1301511526107788},{"id":"https://openalex.org/keywords/mathematical-economics","display_name":"Mathematical economics","score":0.08430510759353638}],"concepts":[{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.8027976751327515},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6069017052650452},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5943898558616638},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5758470296859741},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5451521277427673},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.5230677723884583},{"id":"https://openalex.org/C46814582","wikidata":"https://www.wikidata.org/wiki/Q23389","display_name":"Nash equilibrium","level":2,"score":0.43389618396759033},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.431270956993103},{"id":"https://openalex.org/C190253527","wikidata":"https://www.wikidata.org/wiki/Q295354","display_name":"Law and economics","level":1,"score":0.381268173456192},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.19053232669830322},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.17226091027259827},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.1301511526107788},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.08430510759353638},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2462410.2462425","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2462410.2462425","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 18th ACM symposium on Access control models and technologies","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.800000011920929,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1486090544","https://openalex.org/W1504707391","https://openalex.org/W1559155956","https://openalex.org/W1559498407","https://openalex.org/W1635651613","https://openalex.org/W1977764760","https://openalex.org/W1985929316","https://openalex.org/W1989602286","https://openalex.org/W1996983098","https://openalex.org/W2007572995","https://openalex.org/W2026973187","https://openalex.org/W2036910349","https://openalex.org/W2040234252","https://openalex.org/W2070258618","https://openalex.org/W2080914957","https://openalex.org/W2084621663","https://openalex.org/W2104568606","https://openalex.org/W2104734478","https://openalex.org/W2109387928","https://openalex.org/W2162171351","https://openalex.org/W2340406763"],"related_works":["https://openalex.org/W570220410","https://openalex.org/W2005029151","https://openalex.org/W4298412018","https://openalex.org/W1578113342","https://openalex.org/W318167434","https://openalex.org/W4230269258","https://openalex.org/W2950847833","https://openalex.org/W2950799274","https://openalex.org/W3125065097","https://openalex.org/W4366959280"],"abstract_inverted_index":{"The":[0],"Chinese":[1],"Wall":[2],"security":[3],"policy":[4,69,96],"states":[5,65],"that":[6,10,56,97,138,144,155,181,201,208],"information":[7,211,236],"from":[8,15],"objects":[9,207],"are":[11],"to":[12,21,52,196,198,214,231],"be":[13,74,232],"confidential":[14,203,210],"one":[16,182],"another":[17],"should":[18],"not":[19,71,116],"flow":[20],"a":[22,127,136,192],"subject.":[23],"It":[24],"addresses":[25],"conflict":[26,217],"of":[27,37,81,126,134,152,159,183,218],"interest,":[28],"and":[29,39,100,102,111],"was":[30],"first":[31],"articulated":[32],"in":[33,66,84,180,235],"the":[34,48,68,95,118,124,131,156,176,187,215],"well-cited":[35],"work":[36,167,222,234],"Brewer":[38],"Nash,":[40],"which":[41,67],"proposes":[42],"also":[43],"an":[44,91,105,199],"enforcement":[45,58,92,122,142,157],"mechanism":[46,59,93,143,158],"for":[47,94],"policy.":[49,119],"Work":[50],"subsequent":[51],"theirs":[53],"has":[54],"observed":[55],"their":[57],"is":[60,70,98,108,145,154,161,174,178,194,228],"overly":[61],"restrictive":[62,164],"--":[63,104],"authorization":[64,106],"violated":[72],"may":[73],"rendered":[75],"unreachable.":[76],"We":[77],"present":[78,90],"two":[79],"sets":[80],"novel":[82],"results":[83,153],"this":[85],"context.":[86],"In":[87,120],"one,":[88],"we":[89,139,170],"simple":[99],"efficient,":[101],"least-restrictive":[103,146],"state":[107],"reachable":[109],"if":[110,113,191],"only":[112],"it":[114],"does":[115],"violate":[117],"our":[121],"mechanism,":[123],"actions":[125,133],"subject":[128,193],"can":[129],"constrain":[130],"prospective":[132],"another,":[135],"trade-off":[137],"show":[140],"every":[141],"must":[147,212],"incur.":[148],"Our":[149,221],"other":[150],"set":[151],"Brewer-Nash":[160],"even":[162],"more":[163],"than":[165],"previous":[166],"establishes.":[168],"Specifically,":[169],"show:":[171],"(1)":[172],"what":[173,227],"called":[175],"*-rule":[177],"overspecified":[179],"its":[184],"sub-rules":[185],"implies":[186],"other,":[188],"and,":[189],"(2)":[190],"authorized":[195],"write":[197],"object":[200],"contains":[202],"information,":[204],"then":[205],"all":[206],"contain":[209],"belong":[213],"same":[216],"interest":[219],"class.":[220],"sheds":[223],"new":[224],"light":[225],"on":[226],"generally":[229],"considered":[230],"important":[233],"security.":[237]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
