Keynote: How can we avoid conflicts of interest?

Activity: Talk or PresentationInvited talk

Description

BACKGROUND:

Ethical security policies ensure confidentiality properties that respect conflicts of interest. They are inspired by Chinese Walls originally introduced to avoid insider trading. Still today, insider trading is a major issue leading to regular criminal proceedings and multi-million-dollar fines. Conflicts of interests can also arise in computer systems such as Cloud computing and other decentralised architectures, where multiple organisations share infrastructure and resources. A famous paper by Brewer and Nash proposed a formal security policy model inspired by ethical Chinese Wall policies, where a policy model ensures that security policies that conform to the model guarantee the security properties of the model. The formal semantics of the Brewer-Nash model were however underspecified, leaving scope for multiple interpretations of what accesses are permitted and what the intended security goals are.

In this talk we scrutinise famous papers on ethical policy models and develop two formal models. The first clarifies directly the model intended by Brewer and Nash. The second is a more abstract generalisation, inspired by Sandu’s work on Lattice-based Access Control. An interesting feature of these models is that write access can be revoked when a subject (the entity accessing data) reads too much information. I’ll argue that this problem is too important to be left underspecified and that our methodology can bring more confidence and flexibility to policies while respecting conflicts of interest.
Period11 Aug 202514 Aug 2025
Event titleVeTSS Summer School 2025
Event typeConference
LocationGlasgow, United KingdomShow on map
Degree of RecognitionInternational