期刊文献+

网络安全综合监控平台中安全策略的研究 被引量:2

Research on Security Policy in NSMP
下载PDF
导出
摘要 通过分析网络安全综合监控平台中安全策略的特点和要求,给出了安全策略的一般性定义和描述,研究了策略的完整性、正确性、一致性要求,以及策略冲突的处理原则.在基于规则的专家系统推理引擎基础上,为网络安全综合监控平台建立一种基于规则引擎的安全策略处理机制,描述了规则引擎的推理和使用步骤.该机制能够分离安全策略的管理决策逻辑和技术决策逻辑,具有较强的策略冲突解决能力.应用证明了该系统具有较强的鲁棒性和适应性.
出处 《计算机研究与发展》 EI CSCD 北大核心 2006年第z2期430-436,共7页 Journal of Computer Research and Development
基金 国防科技基础研究基金项目(20021823)
  • 相关文献

参考文献7

  • 1[1]Laurence Cholvy,Frédéric Cuppens.Analyzing onsistency of security policies.In:Proc of the 1997 IEEE Symposium on Security and Privacy.Los Alamitos,CA:IEEE Computer Society Press,1997
  • 2[2]E Al-Shaer,H Hamed,Raouf Boutaba,et al.Conflict classification and analysis of distributed firewall policies.http:// www.mnlab.cs.depaul.edu/projects/FPA/files/jsac05.pdf,2005
  • 3姚键,茅兵,谢立.一种基于有向图模型的安全策略冲突检测方法[J].计算机研究与发展,2005,42(7):1108-1114. 被引量:29
  • 4[4]Jonathan D,Morris S.Policy conflict analysis in distributed system management.http://www.moffett.me.uk/jdm/pubs/polconfl.pdf,1993
  • 5张斌,王国仁,郑怀远.面向对象的多数据库系统中冲突的分类及解决策略[J].计算机研究与发展,1997,34(S1):307-311. 被引量:7
  • 6[6]Madhur Kohli,Jorge Lobo.Realizing network control policies using distributed action plans.Journal of Network and Systems Management,2003,11(3):305-327
  • 7[7]C L Forgy.Rete:A fast algorithm for the many pattern/many object pattern match problem.Artificial Intelligence,1982,19(1):17-37

二级参考文献17

  • 1J. Chomicki, J. Lobo, S. Naqvi. A logic programming approach to conflict resolution in policy management. The 7th Int'l Conf.Principles of Knowledge Representation and Reasoning(KR2000), Breckenridge, Colorado, USA, 2000
  • 2A. Westerinen, J. Schnizlein, J. Strassner, et al. Terminology for policy-based. RFC 3198, Internet Engineering Task Force (IETF), 2001
  • 3V.D. Gligor, S. I. Gavrila, D. Ferraiolo. On the formal definition separation-of-duty policies and their composition. The 19th IEEE Symposium on Security and Privacy, Oakland, CA,1998
  • 4D.F.C. Brewer, M. J. Nash. The Chinese Wall security policy. In: Proc. IEEE Symposium on Research in Security and Privacy. Los Alamitos, CA: IEEE Computer Society Press, 1989
  • 5R. Yavatkar, D. Pendarakis, R. Guerin. A framework for policy-based admission control. RFC 2753, 2000
  • 6Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian. A logical language for expressing authorizations. In: Proc. the 1997IEEE Symp. Security and Privacy. Oakland, CA, USA: IEEE Press, 1997. 31~42
  • 7B. Moore. Policy core information model (PCIM) extensions.RFC3460, 2003
  • 8J. Jason, L. Rafalow, E. Vyncke. IPsec configuration policy information model. RFC3585, 2003
  • 9DMTF Standards. DMTF DSP0108. CIM Policy Model White Paper, 2003
  • 10IBM Corporate. Tivoli security management solution. http: //www-900. ibm. com/cn/software/tivoli/solution/solution_ safe. shtml,2002

共引文献34

同被引文献14

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部