期刊文献+

XACML中策略/规则组合算法优化 被引量:1

Optimize on Policy/Rule Combining Algorithm for XACML
下载PDF
导出
摘要 在访问控制领域,基于XACML的组合算法是解决策略/规则冲突的方法,当主体的请求数目达到一定规模后,为了将PDP模块进行评估的时间缩短,势必要考虑该算法的优化问题。在对XACML研究的基础上对XACML的规则组合算法进行了优化。通过模拟程序表明,使用该优化措施后,缩短了PDP进行评估的时间,改善了系统的交互性。 In the field of access control, Combining algorithms based XACML is a method of policy /rule conflict resolution, when the subject's requests reach a certain magnitude, it is bound to consider the optimization problem for shorting the period of evaluation with PDP. Based on the study of XACML, this paper optimized the rule combining algorithms. It is show that the optimization measures do shorten the evaluation time of PDP and improved the system's interactive capability through simulation testing.
出处 《微计算机信息》 2009年第15期230-232,共3页 Control & Automation
关键词 访问控制 组合算法 可扩展访问控制标志语言 优化 access control combining algorithm XACML optimization
  • 相关文献

参考文献3

二级参考文献17

  • 1李永超,杨金明,李琳琳.一种新型反激变换器的研究[J].微计算机信息,2006,22(12Z):257-258. 被引量:3
  • 2[3]Brian T.Irving and Milan M.Jovanovie,"Analysis and Design of Self-Oscillating Flyback Convener",IEEE APEC Proc.,pp.897-903,March 2002
  • 3David Ferraiolo, Janet Cugini, Richard Kuhn. Role-based access control(RBAC): features and motivations[C]. In: Proceedings of 11th Annual Computer Security Application Conference, New Orleans, LA, December 11-15 1995,241-48.
  • 4Luigi Guiri. A new model for role-based access control[C]. In: Proceedings of 11th Annual Computer Security Application Conference, New Orleans,LA,December 11-15 1995,249-255.
  • 5Ravi S Sandhu, Edward J Coyne, Hal L Feinstein et al. Role-based access control models[J]. IEEE Computer, Feb. 1996,29(2):38-47.
  • 6Ravi Sanhu, Edward J Coyne, Hal L. Feinstein et al. Role-based access control models[J]. IEEE Computer, 1996,29(2):38-47.
  • 7Ravi Sandhu, Venkata Bhamidipati, Qamar Munawer. The ARBAC97 model for role-based administration of roles[J]. ACM Transactions on Information and System Security. 1999,2(1):105-135.
  • 8Elisa Bertino, Elena Ferrari, Vijay Alturi. Specification and enforcement of authorization constraints in workflow management systems[J]. ACM Transactions on Information and System Security,1999, 2(1):65-104.
  • 9Xu K,Xu MW,Wu JP,Wu J.Survey on routing lookup algorithms.Journal of Software,2002,13(1):43-50 (in Chinese with English abstract).http://www.jos.org.cn/1000-9825/13/43.pdf
  • 10Zhou W,Meinel C.Implement role based access control with attribute certificates.In:Proc of the ICAC T2004.IEEE Press,2004.536-541.http://citeseer.ist.psu.edu/702966.html

共引文献14

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部