Modeling and Verification of Chinese Wall Policy Based on Petri Nets with Data

Authors

  • Hanqian Tu Department of Computer Science and Technology, Zhejiang Sci-Tech University, 310018 Hangzhou, China
  • Dongming Xiang Department of Computer Science and Technology, Zhejiang Sci-Tech University, 310018 Hangzhou, China
  • Liang Qi Department of Computer Science and Technology, Shandong University of Science and Technology, 266590 Qingdao, China
  • Guanjun Liu Department of Computer Science, Tongji University, 201804 Shanghai, China

Keywords:

Petri net, information security, model checking, Chinese Wall policy, reachability graph

Abstract

Information security is an important issue in the design and development of information systems. As a well-known information security policy, Chinese Wall policy concerns the conflict of interest among sensitive information items. Since it is widely applied in many fields, it is important to explore the verification methods. Petri nets are a widely used formal method in the modeling and verification of information systems, and they are suitable for verifying Chinese Wall policy due to the capability of characterizing the concurrency. Particularly, some studies utilize colored Petri nets for modeling and verification of Chinese Wall policy. However, they do not characterize data operations including read, write and delete, which may affect the verification results. In this paper, we utilize Petri net with data (PD-net) to model and verify this policy. Specifically, we propose PD-nets for Chinese Wall policy to depict the control-flows, data-flows and data operations of information systems, introduce configurations and reachability graphs to describe the running states, and develop an algorithm to detect the violations of Chinese Wall policy. Furthermore, a case study is presented to show the feasibility of our method.

Downloads

Download data is not yet available.

Published

2025-10-27

How to Cite

Tu, H., Xiang, D., Qi, L., & Liu, G. (2025). Modeling and Verification of Chinese Wall Policy Based on Petri Nets with Data. Computing and Informatics, 44(4). Retrieved from https://www.cai.sk/ojs/index.php/cai/article/view/7513

Issue

Section

Special Section Articles

Most read articles by the same author(s)