期刊文献+

基于综合安全保护质量的安全服务协商模型 被引量:1

A Security Service Negotiation Model Based on General Quality of Protection
下载PDF
导出
摘要 在基于分布式服务的系统体系中,上层应用系统需要确定下层安全服务能够按照要求提供安全服务功能,根据不断变化的实际需要和当前系统状态自适应地调整服务者和服务要求,并同时保障系统的安全性。本文探讨了在应用系统和安全服务之间对安全保护质量进行协商的协议模型,目标是使应用系统所要求达到的安全水平能获得安全服务的支持,并能得到下层安全服务的有效遵守,使系统的整体安全水平得到保障。 In a system based on distributed services, the upper-level application system requests the lower-level security services to provide various security functions according to the former' s demands, to adjust the service relationship with different service providers on different requests automatically along with the change of the current requests and states, to protect the security at the same time. A negotiation protocol model based on the quality of protection which is used between applications and security services is presented here,and its goal is to ensure the security services' support and abidance on the security standard required bv the applications, which will ensure the general security of the whole system.
出处 《计算机工程与科学》 CSCD 2006年第4期26-29,36,共5页 Computer Engineering & Science
基金 国家973高技术发展项目基金(G20000263)
关键词 安全服务 保护质量 安全模型 协商协议 security service quality of protection security model negotiation protocol
  • 相关文献

参考文献6

  • 1G Edwards, D C Schmidt,A Gokhale,et al.Integrating Publisher/Subscriber Services in Component Middleware for Distributed Real-Time and Embedded Systems[A].Proc of the 42nd Annual Southeast Regional Conf[C].2004.171-176.
  • 2B Marquet, C Gustave,A Lefebvre,et al.Security Services in a Multi-tier Architecture[A].World Telecom Congress 2002 (WTC 2002)[C].2002.
  • 3J Linn.Generic Security Service Application Program Interface[R].RFC 1508,1993.
  • 4Object Management Group. RFC: Quality of Protection Management and Control[EB/OL].http://www.omg.org / docs/security/98-09-02.pdf,2004-05.
  • 5ISO. IEC10181-1/2/3/4/5/6/7-97,Information Technology-Open Systems Interconnection-Security Frameworks for Open Systems[S].1996.
  • 6R Braden.Resource Reservation Protocol (RSVP)[R].RFC 2205,1997.

同被引文献15

  • 1Howard M,Pincus J,Wing J M.Measuring relative attack surfaces[C]//Proc,of Workshop on Advanced Developments in Software and Systems Security.Taipei,2003.
  • 2Manadhata P,Wing J M.Measuring a system's attack surface[R].CMU-CS-04-102.Computer Science Department of Camegie Mellon University,2004.
  • 3Manadhata P,Wing J M.An attack surface metric[R].CMUCS-05-155.Computer Science Department of Carnegie Mellon University,2005.
  • 4Manadhata P,Wing J,Flynn M,et al.Measuring the attack surfaces of two FTP daemons[C]//Proceedings of the 2nd ACM Φorkahop on Quality of Protection.Alexandria VA,USA,2006.
  • 5Manadhata P,Kaynar D K,Wing J M.A formal model for a system's attack surface[R].CMU-CS-07-144.Computer Science Department of Carnegie Mellon University,2007.
  • 6Mirkovic J,Reiher P,Fahmy S,et al.Measuring Denial of Service[C]//Proceedings of the 2nd ACM Workshop on Quality of Protection.Alexandria VA,USA,2006.
  • 7Pamula J,Jajodia S,Ammann P,et al.A Weakest-adversary Security Metric for Network Configuration Security Analysis[C]//Proceedings of the 2nd ACM Workshop on Quality of Protection.Alexandria VA,USA,2006.
  • 8Wang Lingyu,Singhal P A,Jajodia P S.Toward measuring network security using attack graphs[C]//Proceedings of the 2nd ACM Workshop on Quality of Protection.Alexandria VA,USA,2007.
  • 9Ozment A.Improving vulnerability discovery models[C]//Proceedings of the 20d ACM Workshop on Quality of Protection.Alexandria VA,USA,2007.
  • 10Abedin M,Nessa S,Al-Shaer E,et al.Vulnerability analysis for evaluating quality of protection of security policies[C]//Proceedings of the 2nd ACM Workshop on Quality of Protection.Alexandria VA,USA,2006.

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部