期刊文献+

一种安全策略的冲突检测与消解方法 被引量:4

Method of conflict detection and elimination for security policy
下载PDF
导出
摘要 安全策略是系统安全管理的基础。分布式环境的复杂性使策略配置中不可避免地存在冲突。如何有效地分析检测策略冲突并解决冲突是应用安全策略的关键。提出了一个极具一般性的安全策略形式化描述方法,并定义了安全策略描述要素间的逻辑关系;给出了安全策略间的冲突分类描述;针对不同的冲突类型给出了相应的冲突检测算法及消解方法。 Security policy is the base of system security management.It is difficult to eliminate policy conflict in the distribution system because of its complexity.Therefore,conflict detection and elimination of policy is the key to realize policy-based system defense.This paper proposed a general formal description of policy,defined the logic relationship among the policy s elements,and classified the conflicts of policy,then discussed some conflict detection and elimination methods corresponding to the conflicts.
出处 《计算机应用》 CSCD 北大核心 2009年第3期823-825,829,共4页 journal of Computer Applications
关键词 安全策略 冲突检测 冲突消解 security policy conflict detection conflict elimination
  • 相关文献

参考文献7

  • 1MOORE B,ELLESSONE,STRASSNER J,et al.PolicyCore Information Model[].RFC.2001
  • 2MOORE B.Policy Core Information Model Extensions[].RFC.2003
  • 3JASON J,RAFALOWL,VYNCKE E.IPsec Configura-tion Policy Information Model[].RFC.2003
  • 4BOYLE J,COHEN R,HERZOG S,et al.The COPS(Common Open Policy Service)Protocol[].RFC.2000
  • 5CHARALAMBIDES M,FLEGKAS P,PAVLOUG.Dynamic policyanalysis and conflict resolution for DiffServ quality of service man-agement[].th IEEE/IFIP Network Operations and Manage-ment Symposium.2006
  • 6CHARALAMBIDES M,FLEGKAS P,PAVLOU G.Policy conflictanalysis for quality of service management[].Proceedings ofSixth IEEE International Workshop on Policies for Distributed Sys-tems and Networks.2005
  • 7Lupu E,Slomanm.Conflictsin Policy-Based Distributed Sys-tems Management[].IEEE Trans on Software Engineering Special Issue on Inconsistency Management.1999

同被引文献28

  • 1何再朗,田敬东,张毓森.策略冲突类型的细化及检测方法的改进[J].吉林大学学报(信息科学版),2005,23(3):287-293. 被引量:10
  • 2姚键,茅兵,谢立.一种基于有向图模型的安全策略冲突检测方法[J].计算机研究与发展,2005,42(7):1108-1114. 被引量:29
  • 3罗万伯,罗霄岚,陈炜,李征,魏雁平.多域环境的安全策略管理框架研究[J].四川大学学报(工程科学版),2006,38(2):114-117. 被引量:7
  • 4郑秋生,白永红,夏冰.计算机网络安全评估技术的研究[C]//.计算机研究新进展(2009).北京:电子工业出版社,2009:26-30.
  • 5Peter Mell,Karen Scarfone,Sasha Romanosky. A Complete Guide to the Common Vulnerability Scoring System Version2. 0 [EB/OL]. (2009-- 04-- 08). http//www, first, org/cvss/cvss-guide, htm.
  • 6ISS X-Force Database. Microsoft Windows 2000 Brute Force Attack[EB/OL]. [2011- 03--01]. http://xforce, iss. net/xforce/xfdb/5585.
  • 7National Vulnerability Database. CVE-- 2000 -- 1217[EB/OL]. (2008 -- 09 -- 05) [2011 -- 03 -- 01]. http://web, nvd. hist. gov/view/vuln/detail? vulnId = CVE-- 2000 -- 1217.
  • 8US-CERT. Vulnerability Note VU # 818496 [EB/OL]. ( 2001 -- 04 -- 30) [ 2011 -- 03 -- 01 ]. http ://www. kb. cert. org/vuls/ id/818496.
  • 9MOFFETT J D,SLOMAN M S. Policy conflict analysis in distributed system management[J]. Journal of OrganizationalComputing and Electronic Commerce, 1994,4(1) : 1-22.
  • 10LUPU E C,SLOMAN M. Conflicts in policy-based distributed systems management[J]_ IEEE Transactions on SoftwareEngineering,1999 ,25(6) :852-869.

引证文献4

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部