期刊文献+

策略冲突的检测和解决方法研究 被引量:5

Detecting and Resolving Policy Conflicts
下载PDF
导出
摘要 基于策略的方法在分布式系统和网络管理领域已得到广泛实施。策略中的冲突会导致不一致的系统行为根据策略所作用的协议层次,将策略分为应用级和网络级两类。本文深入研究了每一类策略的冲突现象,并综述了冲突的检测和解决方法,对其优缺点加以分析;最后给出了未来的研究方向。 The policy-based approach has been an important means of managing distributed systems and networks. However, conflicts can cause undesirable system behaviors. According to the protocol levels on which they are acting, policies are classified into the application level and the network level. Based on the two-level policy architecture, the origins of policy conflicts are explored, and the algorithms of detecting and resolving the inconsistencies between policies are surveyed. Then the benefits and shortcomings of these methods are investigated. Finally, some of the future research directions and open problems are discussed.
出处 《计算机工程与科学》 CSCD 2006年第5期18-22,共5页 Computer Engineering & Science
基金 国家973计划资助项目(2003CB314802) 国家自然科学基金资助项目(90204005)
关键词 基于策略的管理 策略冲突 冲突检测 冲突解决 policy-based managemcnt policy conflict conflict detection conflict resolution
  • 相关文献

参考文献13

  • 1J D Moffett,M S Sloman.Policy Conflict Analysis in Distributed System Management[J].Ablex Publishing Journal of Organizational Computing,1994,4(1):1-22.
  • 2Z Fu,S F Wu.Automatic Generation of IPSec/VPN Security Policies in an Intra-Domain Environment[A].Distributed System Operation and Management Workshop(DSOM 2001)[C].2001.
  • 3J D Moffett,M S Sloman.Policy Hierarchies for Distributed Systems Management[J].IEEE Journal on Selected Areas in Communication,1993,11(9):1404-1414.
  • 4J D Moffett.Requirements and Policies[A].Position Paper for Policy Workshop 1999[C].1999.
  • 5M Koch,L V Mancini,F P Presicce.A Formal Model for Role-Based Access Control Using Rraph Transformation[A].Proc of the 6th European Symp on Research in Computer Security (ESORICS 2000).LNCS 1895[C].2000.122-139.
  • 6M Koch,L V Mancini,F P Presicce.On the Specification and Evolution of Access Control Policies[A].Proc 6th ACM Symp on Access Control Models and Technologies[C].2001.121-130.
  • 7M Koch,L V Mancini,F P Presicce.Conflict Detection and Resolution in Access Control Policy Specifications[A].Proc FoSSaCS 2002.LNCS 2303[C].2002.223-237.
  • 8L Cholvy,F Cuppens.Analyzing Consistency of Security Policies[A].IEEE Symp on Security and Privacy[C].1997.
  • 9J B Michael,E H Sibley,R Baum,et al.On the Axiomatization of Security Policy:Some Tentative Observations About Logic Representation[A].Database Security,VI:Status and Prospects[M].1992.
  • 10J B Michael.A Formal Process for Testing the Consistency of Composed Security Policies:[Ph D Dissertation][D].Department of Information and Software Systems Engineering,George Mason University,1993.

同被引文献26

引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部