期刊文献+

基于多域环境的安全策略冲突检测模型研究 被引量:1

Research on security policy collision detection module based on multi-domain environment
下载PDF
导出
摘要 本文介绍了安全策略及冲突检测的基本概念,并在此基础上分析了几种安全描述语言在多域环境下的管理框架,及其它们各自在多域环境下的策略冲突检测中的优缺点,并讨论了现有存在的问题.在此基础上给出基于有向图覆盖的冲突检测模型.并以角色权限冲突的检测为实例,给出了具体的解决方案. The article introduces basic conception of security strategy and collision detection and analyzes management framework of some kinds of language which describes security in multi-domain environment, It also analyzes these languages' advantages and disadvantages in policy collision detection in multi-domain environment and discusses present problems. Based on these, it gives collision detection module based on directed graph's cover. It also gives detailed solution with example of detection of role permision collision.
作者 王琳 滕玲莹
出处 《西南民族大学学报(自然科学版)》 CAS 2008年第4期829-832,共4页 Journal of Southwest Minzu University(Natural Science Edition)
关键词 多域 安全策略 冲突检测 有向图 multi-domain: security policy: collision detection: directed graph
  • 相关文献

参考文献4

二级参考文献24

  • 1廖俊国,洪帆,朱贤,肖海军.多域间动态角色转换的职责分离[J].计算机研究与发展,2006,43(6):1065-1070. 被引量:14
  • 2廖俊国,洪帆,朱贤,肖海军.动态角色转换的关联优化[J].计算机工程与应用,2006,42(18):130-132. 被引量:3
  • 3J. Chomicki, J. Lobo, S. Naqvi. A logic programming approach to conflict resolution in policy management. The 7th Int'l Conf.Principles of Knowledge Representation and Reasoning(KR2000), Breckenridge, Colorado, USA, 2000
  • 4A. Westerinen, J. Schnizlein, J. Strassner, et al. Terminology for policy-based. RFC 3198, Internet Engineering Task Force (IETF), 2001
  • 5V.D. Gligor, S. I. Gavrila, D. Ferraiolo. On the formal definition separation-of-duty policies and their composition. The 19th IEEE Symposium on Security and Privacy, Oakland, CA,1998
  • 6D.F.C. Brewer, M. J. Nash. The Chinese Wall security policy. In: Proc. IEEE Symposium on Research in Security and Privacy. Los Alamitos, CA: IEEE Computer Society Press, 1989
  • 7R. Yavatkar, D. Pendarakis, R. Guerin. A framework for policy-based admission control. RFC 2753, 2000
  • 8Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian. A logical language for expressing authorizations. In: Proc. the 1997IEEE Symp. Security and Privacy. Oakland, CA, USA: IEEE Press, 1997. 31~42
  • 9B. Moore. Policy core information model (PCIM) extensions.RFC3460, 2003
  • 10J. Jason, L. Rafalow, E. Vyncke. IPsec configuration policy information model. RFC3585, 2003

共引文献72

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部