期刊文献+

基于策略的安全管理研究 被引量:3

RESEARCH ON POLICY-BASED SECURITY MANAGEMENT
下载PDF
导出
摘要 为实现集成、协同和统一的安全管理目标 ,Policy越来越多地应用在安全管理领域。本文考察分析了基于策略的安全管理的四个组成部分 :安全策略的语言表示、信息模型、通信协议和体系结构的现状与趋势后 ,指出其中关键问题是安全策略表示和安全策略在异构环境中的执行。最后 ,通过开发一个原型系统 。 To meet the requirement of security management of integrity,cooperation and unification,policies are increasingly used to the field of security management.In this paper,after analyzed the four parts of security management—specification language,information model,communication protocol and architecture of security policy,we point that the key problems are security policies specification and execution in heterogeneous environment.Finally,a prototype is developed to explore the solution to the key problems.
出处 《计算机应用与软件》 CSCD 北大核心 2005年第3期115-119,共5页 Computer Applications and Software
关键词 信息安全 信息技术 安全管理 安全策略 Security policy Security management Information model Policy specification language Conflict resolution PCIM PIB
  • 相关文献

参考文献14

  • 1国家973安全体系翻译组美国国家安全局.信息保障技术框架[M].北京中软出版社,2002,4..
  • 2Alpers,B.,Plansky,H.Concepts and Application of Policy-Based Management,in A.S.Sethi,Y.Raynaud,F.Faure-Vincent(eds),Integrated Network Management IV,Chapman Hill,London,pp.57~68.1995.
  • 3Jajodia,S.,P.Samarati and V.S.Subrahmanian(1997).A Logical Language for Expressing Authorisations.In Proceedings of the IEEE Symposium on Security and Privacy,pp.31~42,May 4~7,1997.
  • 4Hayton,R.J.,J.M.Bacon and K.Moody (1998).Access Control in an Open Distributed Environment.In Proceedings of the IEEE Symposium on Security and Privacy,Oakland,California,U.S.A.,pp.3~14,May 1998.
  • 5Lobo,J.,R.Bhatia and S.Naqvi(1999).A Policy Description Language.In Proceedings of the Sixteenth National Conference on Artificial Intelligence Eleventh Innovative Applications of AI Conference,Orlando,Florida,USA,18~22 July 1999.
  • 6OASIS(2001)(Organization for the Advancement of Structured Information Standards),XACML language proposal,version 0.8,available from http:∥www.oasis-open.org/committees/xacml,10 January 2002.
  • 7Moore,B.,E.Ellesson,J.Strassner and A.Westerinen(2001),Policy Core Information Model-Version 1 Specification,RFC 3060,available from http:∥www.ietf.org,February 2001.
  • 8J.Case,et al.Message Processing and Dispatching for Simple Network Management Protocol(SNMP)RFC3412,December 2002.
  • 9D.Durham,Ed.et al.The COPS(Common Open Policy Service)Protocol.RFC2748,January 2000.
  • 10M.Wahl,et al.Lightweight Directory Access Protocol(v3).RFC2251,December 1997.

同被引文献16

  • 1周志波.结合安全域的思想建设安全运营中心[J].信息安全与通信保密,2006,28(6):87-89. 被引量:5
  • 2李晓峰,冯登国,徐震.基于扩展XACML的策略管理[J].通信学报,2007,28(1):103-110. 被引量:10
  • 3陈晓苏,林植,冯向东.基于分层模型的网络安全策略逐级求精算法[J].小型微型计算机系统,2007,28(6):998-1002. 被引量:8
  • 4Moffett J D, Sloman M S. Policy hierarchies for distributed systems management[J]. IEEE Journal on Selected Areas in Communications, 1993, 11 (9): 1 404-1 414.
  • 5Darimont R, Van Lamsweerde A. Formal refinement patterns for goal-driven requirements elaboration [C] // Proceedings of the 4th ACM SIGSOFT Symposium on Foundations of Software Engineering. San Francisco: ACM Press, 1996: 179-190.
  • 6Bandara A K, Lupu E C, Russo A. A Goal-based approach to policy refinement[C] // IEEE International Workshop on Policies for Distributed Systems and Networks. New York: IEEE Computer Society, 2004: 1-11.
  • 7Bandara A, Lupu E, Russo A, et al. Policy refinement for diffServ quality of service management[J]. Integrated Network Management, 2005, 5: 469-482.
  • 8Heaven W, Finkelstein A. A UML profile to support requirements engineering with KAOS[J]. IEEE Proeeedings: Software, 2005, 151(1): 10-27.
  • 9Aib I,Agoulmine N, Fonseca M S,et al. Analysis of policy management models and specification languages [C]//Network Control and Engineering for QoS, Security and Mobility II, IFIP TC6/WG6. 2 and WG6. 7 Second International Conference. Muscat: Kluwer Academic Publishers, 2003 : 26-50.
  • 10Damianou N, Dulay N, policy specification langu International Workshop Systems and Networks Lupu E, et al. The ponder age[C]//Proceedings of the on Policies for Distributed London: Springer-Verlag,2001:18-38.

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部