期刊文献+

基于宏策略的策略翻译方法

Policy Translation Method Based on Macro Policy
下载PDF
导出
摘要 策略翻译是策略管理的重点和难点。传统策略翻译方法解决了策略到一类设备的一种配置方式的转换,但通用性不好。该文提出一种基于宏策略的策略翻译方法,通过定义宏策略和翻译脚本,解决了策略到不同设备的不同配置方式之间的转换问题。该方法简单、稳定,具有良好的通用性和扩展性。 Policy translation is the most important and difficult technology of policy management. Traditional policy translation method resolves the problem of transforming a policy to one kind of configuration mode and is poor in universality. This paper proposes a policy translation method based on macro policy. By defining macro policy and translation script, this method resolves the problem of" transforming a policy to all kinds of configuration modes, which is simple, steady, universal and extensible.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第4期54-56,62,共4页 Computer Engineering
关键词 策略翻译 宏策略 翻译脚本 policy translation macro policy translation script
  • 相关文献

参考文献8

  • 1Solsoft Policy Server Better Management for Network Security. A Solsoft White Paper[EB/OL]. (2003-12-08). http://www.antpower. org/AntFolder_ Security_Policy_Management.
  • 2NetScreen Technologies Inc.. Administrator's Guide NetScreenSecurity Manager[EB/OL]. (2004-07-06). http://www.juniper.net/ software/security-manager.
  • 32heck Point Software Technologies Ltd. Check Point Smart Center Guide[EB/OL]. (2002-05-15). http://support.checkpoint.com/kb.
  • 4Beigi M S. Policy Transformation Techniques in Policy-based Systems Management[C]//Proc. of IEEE International Workshop on Policies for Distributed Systems and Network. Yorktown: [s. n.]. 2004.
  • 5Mont M, Baldwin A. Power Prototype: Towards Integrated Policy Based Management[C]//Proc. of IEEE/IFIP Network Operations and Management Symposium. Honolulu: [s. n.]. 2000.
  • 6曾旷怡,张金祥,杨家海.一种基于域内的访问控制策略提炼模型及其实现[J].计算机工程,2006,32(11):136-137. 被引量:1
  • 7Niemann T.Lex和Yacc简明教程[EB/OL].(2006-10-29).http://www.epaperpress.com.
  • 8Andreasson O.Iptables指南1.1.19[EB/OL].(2006-11-07).http://www.man.ChinaUnix.net.

二级参考文献8

  • 1Moffett J, Sloman M. Policy Hierarchies for Distributed Systems Management[J]. IEEE Journal on Selected Areas in Communications,1993,11(9): 1404.
  • 2Lupu E. A Role-based Framework for Distributed Network Management[D]. London, UK: Imperial College, 1998: 111-114.
  • 3Lupu E, Sloman M. Conflicts in Policy Based Distributed Systems Management[J]. IEEE Transactions on Software Engineering, 1999,25(6): 852-869.
  • 4Damianou N, Bandara K A, Sloman M, et al, A Survey of Policy Specification Approaches[D]. London, UK: Imperial College,2002-04: 28-32.
  • 5Mont M, Baldwin A, Goh C. Power Prototype: Towards Integrated Policy Based Management[C]. IEEE/IFIP Network Operations and Management Symposium, Honolulu, USA, 2000.
  • 6Verma D. Simplifying Network Adminisration Using Policy Based Management[J]. IEEE Network, 2002, 16(2): 20-26.
  • 7Bandara A, Lupu E, Russo A. Using Event Calculus to Formalize Policy Specification and Analysis[C]. Proceedings of the 4^th IEEE Workshop on Policies for Distributed Systems and Networks, Lake Como, Italy, 2003-06.
  • 8Zhou Wei. Implement Role Based Access Control with Attribute Certificates[C]. Proceedings of the 6^th International Conference on Advanced Communication Technology, Korea, 2004-02: 536-541.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部