Combinations of access are limited so as to limit the
combination of information available to an individual. Examples include the
Chinese walls used in the financial industries to prevent traders from
gaining access to both future planning information and share value information,
need-to-know separation in shared computing bases, and access controls
in some firewall environments.
Complexity: Chinese walls can become quite complex if they are being used to
enforce fine-grained access controls and if they are expected to deal with
time transitivity of information flow.
fc@red.a.net