期刊文献+

基于多维属性的网络行为控制策略 被引量:2

Network control strategy based on multi-dimensional attributes
原文传递
导出
摘要 访问控制策略是确定分布式聚合资源访问控制的关键。为了保证分布式系统下信息的安全交互和互操作,该文基于多维属性建立主体与客体的网络行为控制通用模型,刻画实体间授权关系,通过策略与规则扩展形式化框架;基于多维属性网络行为控制模型,对分布式系统中访问者访问Web服务的网络行为进行实例分析和模型应用;在实例化策略与规则描述中,提出了策略生成规则方法,给出了规则冲突与冗余的检测与消除方法。通过实例化应用分析表明:该模型与策略方法具有很强的普适性和可扩展性。 The key problem in network control strategies is to determine the access control policies for distributed aggregated resources. The security interactions and interoperability are analyzed here using a general network control model based on the multidimensional attributes of the network behavior to prescribe authorization relations between entities at the attribute level. An'example is given for a visitor accessing the Web service in a distributed system based on the general network control model. The security generation method proceeds from high level behavior control strategies to executable rules. The system is also able to detect and eliminate conflicts and redundancies. The method is easy to apply and has good scalability.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2013年第12期1682-1687,共6页 Journal of Tsinghua University(Science and Technology)
基金 国家"八六三"高技术项目(2011AA010703)
关键词 访问控制 控制策略 多维属性 规则 control network control strategy multidimensional attributes firewall rules
  • 相关文献

参考文献13

  • 1Agarwal S, Sprick B. Access control for semantic Web services [C]// Proceedings of the 1st International Conference on Web Services. Washington DC, USA: IEEE Computer Society, 2004:770 - 773.
  • 2Verma D C. Simplifying network administration using policy-based management [J]. IEEE Network, 2002, 16(2) : 20- 26.
  • 3Ribeiro C, Zuquete A, Ferreira P, et al. SPL: An access control language for security policies with complex constraints [C]// Proceedings of the Network and Distributed System Security Symposium. San Diego, USA: Internet Society Press, 2001.
  • 4OASIS 2001. XACML language proposal, version 0. 8 [Z].
  • 5Herzberg A, Mass Y, Michaeli J, et al. Access control meets public key infrastructure, or assigning roles to strangers [C]// Proceedings of the IEEE Symposium on Security and Privacy. Berkeley, USA: IEEE Computer Society, 2000: 2- 14.
  • 6Damianou N, Dulay N, Lupu E C, et al. Ponder: A Language (or Specifying Security and Management Policies for Distributed Systems, The Language Specification-Version 2. 3, Research Report DoC 2000/1 [R]. London, UK: Imperial College of Science Technology and Medicine, 2000.
  • 7Damianou N, Dulay N, Lupu E C, et al. The ponder policy specification language [C]// Proceedings of Workshop on Policies for Distributed System and Networks. Bristol, UK: Lecture Notes in Computer Science, 2001 : 18 - 39.
  • 8Damianou N, Dulay N, Impu E C, et al. Managing security in object-based distributed systems using Ponder [C]// Proceedings of the 6th Open European Summer School. Enschede, The Netherlands: Computing Publications, 2000.
  • 9Damianou N, Dulay N, Lupu E, et al. Tools for domain-based policy management of distributed systems [C]// Proceedings of the Network Operations and Management Symposium. Florence, Italy: Institute of Electrical and Electronics Engineers Inc. , 2002:203 -217.
  • 10林莉,怀进鹏,李先贤.基于属性的访问控制策略合成代数[J].软件学报,2009,20(2):403-414. 被引量:41

二级参考文献82

共引文献227

同被引文献40

  • 1汪茂海,郭航,马重芳,贾杰林,刘璿,叶芳,俞坚.直接甲醇燃料电池动态性能的研究[J].中国电机工程学报,2005,25(6):161-165. 被引量:12
  • 2陈浩元.科技书刊标准化18讲[M].北京:北京师范大学出版社,2000.59.
  • 3科技部,财政部.国家重点实验室建设与运行管理办法[EB/OL].(2008-09-11)[2012-01-16].http://www.most.gov.cn/tztg/200809/P020080910598387340007.doe.
  • 4黄巧冰.内皮细胞屏障与烧伤后血管通透性的关系及机制[J].中华烧伤杂志,2007,23(5):324-326. 被引量:14
  • 5广东省科学技术厅.广东省科学技术厅关于省企业重点实验室建设与运行的管理办法[EB/OL].(2012-04-13)http://www.gd.gov.cn/govpub/bmguifan/201205/t20120518-.161313.htm.
  • 6上海市科学技术委员会.上海市重点实验室建设和管理办法[EB/OL].(2003-10-14)[2014一11-28].http://www.stcsm.gov.cn/gk/zcfg/gfxwz/fkwwj/333808.htm.
  • 7北京市科学技术委员会.北京市科学技术委员会关于印发《北京市重点实验室认定与管理暂行办法》的通知[EB/OL].(2010-08-10)http://govinfo.nlc.gov.cn/bjfz/xxgk/bjskw/201211/t20121113_3091779, html? classid = 423,.
  • 8湖北省科学技术厅,湖北省教育厅.关于印发《湖北省重点实验室管理暂行办法》的通知[EB/OL].(2003494493)http://www.hbe.gov.cn/content.php?id=2346.
  • 9浙江省科学技术厅,浙江省发展和改革委员会.关于印发《浙江省重点实验室(工程技术研究中心)管理办法》的通知[ EB/OL ]. ( 2014-11-04 ) http://www, zjkjt, gov. cn/news/ node01/detail0001 / 2014/0001_58025. htm.
  • 10HALBOOB W, ABULAISH M, ALGHATHBAR K S. Quaternary privacy-levels preservation in computer forensics investigation process[C]//IEEE International Conference on Communications. IS.1.]: IEEE, 2011: 777- 782.

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部