期刊文献+

可重构安全系统建模与配置生成方法研究

Research on Reconfigurable Security System Modeling and Configuration Generation
下载PDF
导出
摘要 以安全重构元为基础,能够提供高灵活性、适应性和可扩展性安全服务的可重构安全计算系统已成为当前安全研究领域的热点问题.目前,关于重构机理的研究主要采取基于功能候选集的静态重构配置生成方法,可重构安全系统作为一种主动安全防御手段,应具有动态自动重构的能力,避免人工介入导致的脆弱性.针对动态自动可重构安全系统的建模以及配置生成过程的描述问题,提出了一种基于直觉主义逻辑扩展的动态自动可重构安全系统逻辑模型SSPE,给出了逻辑模型SSPE上的语法和推理规则,设计了基于SSPE的等级化安全重构元和安全需求建模和表达方法,并给出了基于映射关系的安全重构元描述向逻辑语言的转换规则.最后,以IPSec协议为例,阐述了可重构安全系统重构配置的动态自动推理生成过程.基于直觉主义逻辑的可重构安全系统建模和配置生成方法,为研究可重构安全系统的重构机理提供了新的思路和方法,具有重要的意义. Reconfigurable security system with high flexibility,adaptability and scalability is a hot issue in the field of security research. At present,research on the reconfiguration mechanism is mainly based on the static reconfiguration method.As an active security defense method,it should have the ability of dynamic automatic reconfiguration.In order to solve the problem of modeling and describing dynamic and automatic reconfigurable security system,this paper proposes a new model,SSPE based on intuitionistic logic,and presents its syntax and inference rules.The transformation rules from the specification of security reconfigurable component to SSPE logic expressions are obtained by the method of mapping relationship.In the end,the paper describes the reasoning and generating process of security system reeonfiguration based on IPSec protocol.Modeling and expression method based on intuitionistie logic can provide new ideas and methods for the research of reconfigurable security system,which is of great significance.
作者 肖玮 陈性元 杜学绘 李海玉 陈宇涵 XIAO Wei;CHEN Xing-Yuan;DU Xue-Hui;LI Hai-Yu;CHEN Yu-Han(Cryptography Engineering College,The PLA Information Engineering University,Zhengzhou 450000,China;Department of Foundation,Aviation University of Air Force,Changchun 130022,China)
出处 《软件学报》 EI CSCD 北大核心 2018年第12期3635-3647,共13页 Journal of Software
基金 国家高技术研究发展计划(863)(2012AA012704) 国家自然科学基金(61502531).
关键词 可重构安全系统 直觉主义逻辑 安全重构元 重构机理 reconfigurable security system intuitionistic logic security reconfigurable component reconfiguration mechanism
  • 相关文献

参考文献3

二级参考文献34

  • 1王千祥,申峻嵘,梅宏.自适应软件初探[J].计算机科学,2004,31(10):168-171. 被引量:21
  • 2杨芙清.软件工程技术发展思索[J].软件学报,2005,16(1):1-7. 被引量:267
  • 3Andersen D G,Balakrishnan H,Feamster N.Accountable Internet protocol//Proceeding of the ACM SIGCOMM2008 Conference on Data Communication.Seattle,USA,2008:339-350.
  • 4Mosharaf N M,Chowdhury Kablr,Boutaba Raouf.Network virtualization:State of the art and research challenges.IEEE Communication Magazine,2009,47(7):20-26.
  • 5Kim Changhoon,Caesar Matthew,Rexford Jennifer.Floodless in SEATTLE:A scalable ethernet architecture for large enterprises//Proceedings of the SIGCOMM 2008.Washington,USA,2008:3-14.
  • 6Amir-Hamed Mohsenian-Rad,Vincent W S Wong,Juri Jatskevich,Robert Schober.Optimal and autonomous incentive-based energy consumption scheduling algorithm for smart grid //Proceedings of the IEEE ISGT2010.Washington,USA,2010:1-6.
  • 7Wang Feng,Xiong Yongqiang,Liu Jiangchuan.mTreebone:A collaborative tree-mesh overlay network for multicast video streaming.IEEE Transactions on Parallel and Distributed Systems,2010,21(3):379-392.
  • 8Tennenhouse David L,David J.Wetherall towards an active network architecture.ACM SIGCOMM Computer Communication Review,2007,37(5):81-94.
  • 9Zhang D,Adelman D.An approximate dynamic programming approach to network revenue management with customer choice.Transportation Science,2009,43(3):381-394.
  • 10Bouabence G,Jelger C,Tschudin C.Virtual network stacks//Proceeding of the ACM Workshop on Programmable Routers for Extensible Services of Tomorrow.Seattle,USA,2008:45-50.

共引文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部