期刊文献+

基于冗余消除和属性数值化的XACML策略优化方法 被引量:6

XACML Policy Optimization Method Based on Redundancy Elimination and Attribute Numericalization
下载PDF
导出
摘要 可扩展的访问控制标记语言(eXtensible Access Control Markup Language,XACML)逐渐成为访问控制的标准之一。为了确保系统可用性,访问控制系统需要高效的XACML策略评估引擎。针对这一问题,从XACML策略本身潜在的不足出发,从冗余消除和属性数值化两个方面对XACML策略进行了优化。冗余消除在不影响策略评估结果的前提下去除策略库中的冗余规则,同时结合规则压缩消除规则间的冗余状态。属性数值化将文本的XACML策略属性转化为数值属性,使评估引擎匹配使用高效的数值匹配方式而不是低效的字符串匹配方式,同时使用Hash表结构存储数值属性与文本属性的映射关系有利于策略维护。仿真实验结果表明,提出的策略优化方法的性能与原始Sun XACML相比有较大提升。 XACML(eXtensible Access Control Markup Language)has become one of main access control standards.Access control systems need effective XACML evaluation engine to ensure system availability.To solve the problem above,this paper optimized XACML policy from two aspects:redundancy elimination and attribute numericalization,based on the potential shortcomings of XACML itself.Redundancy elimination removes the redundant rules in the policies and the redundant states between the rules by applying rule compression method.Attribute numericalization transforms textuary attributes of XACML policies into numerical attributes,to make evaluation engine use effective numerical match,instead of inefficient string match.In addition,it is beneficial for policy management that using Hash table to store the mappings between textuary attributes and numerical attributes.Simulation experimental results show that the policy engine using the policy optimization method proposed in this paper is much faster than Sun XACML.
出处 《计算机科学》 CSCD 北大核心 2016年第2期163-168,共6页 Computer Science
基金 国家自然科学基金项目(61272419)资助
关键词 XACML 策略优化 冗余消除 属性数值化 XACML Policy optimization Redundancy elimination Attribute numericalization
  • 相关文献

参考文献3

二级参考文献39

  • 1李晓峰,冯登国,徐震.基于扩展XACML的策略管理[J].通信学报,2007,28(1):103-110. 被引量:10
  • 2李晓峰,冯登国,何永忠.XACML Admin中的策略预处理研究[J].计算机研究与发展,2007,44(5):729-736. 被引量:5
  • 3Sloman M. Policy driven management for distributed systems. Journal of Network and Systems Management, 1994, 2(4) :333-360.
  • 4Moses T. eXtensible access control markup language (XACML) version 2.0. OASIS Standard, 2005.
  • 5Jajodia S, Samarati P, Subrahmanian V S et al. A unified framework for enforcing multiple access control policies// Proceedings of the ACM SIGMOD International Conference on Management of Data. Tucson, Arizona, USA, 1997, 26 (2) : 474-485.
  • 6Jajodia S, Samarati P, Subrahmanian V S. A logical language for expressing authorizations//Proeeedings of the 1997 IEEE Symposium on Security and Privacy. Los Alamitos, California, USA, 1997:31-42.
  • 7Lupu E, Sloman M. Conflicts in policy-based distributed systems management. IEEE Transactions on Software Engineering, 1999, 25(6): 852-869.
  • 8Cholvy L, Cuppens F. Analyzing consistency of security policies//Proceedings of the 1997 IEEE Symposium on Security and Privacy. Los Alamitos, California, USA, 1997:103-112.
  • 9Dunlop N, Indulska J, Raymond K. Dynamic conflict detection in policy-based management systems//Proceedings of the 6th International Enterprise Distributed Object ComputingConference (EDOC). Lausanne, Switzerland, 2002:15-26.
  • 10Guelev D P, Ryan M, Schobbens P Y. Modei-checking access control policies. Lecture Notes in Computer Science 3225. Berlin: Springer-Verlag, 2004.. 219-230.

共引文献45

同被引文献25

引证文献6

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部