期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
基于XML的组安全策略描述 被引量:1
1
作者 尹青 周伟 王清贤 《计算机科学》 CSCD 北大核心 2003年第5期150-152,共3页
Development of applications built on multi-party communication has made the need for the management ofpolicy. Security Policies are used to bridge the gap between static implementations and user requirements. A securi... Development of applications built on multi-party communication has made the need for the management ofpolicy. Security Policies are used to bridge the gap between static implementations and user requirements. A securitypolicy defines the security relevant behaviors, access control parameters, and security mechanisms used to implementthe group. A policy specification language defines both how a policy is represented and the rules with which the repre-sentation is interpreted. This paper describes the design space of security policy, and presents Group Security PolicyMarkup Language(GSPML)specification based on XML. GSPML, which is oriented to both people and computers,will be flexible and expressive and enough to support different secure requirements. 展开更多
关键词 组安全策略 XML 通信 INTERNET 多播 计算机网络 策略描述语言
下载PDF
安全组策略管理
2
作者 尹青 蔡延荣 王清贤 《计算机科学》 CSCD 北大核心 2005年第1期67-69,161,共4页
安全组通信的前提是一致的安全策略。组安全策略描述成员的安全目标、能力和需求,进而规定安全组的行为、访问控制参数、密码机制等。本文研究安全组策略的管理,包括组策略的制定、协商以及翻译、执行。在策略生命周期的基础上,依据安... 安全组通信的前提是一致的安全策略。组安全策略描述成员的安全目标、能力和需求,进而规定安全组的行为、访问控制参数、密码机制等。本文研究安全组策略的管理,包括组策略的制定、协商以及翻译、执行。在策略生命周期的基础上,依据安全多播组模型,提出组策略管理模型,并描述策略服务器的设计实现。策略的表示采用组安全策略标记语言(GSPML),能够支持组策略灵活的表示和协商。 展开更多
关键词 安全通信 组安全策略 安全多播 策略生命周期 模型 通信安全
下载PDF
IP组播中的防火墙技术
3
作者 何雅云 傅光轩 《计算机工程与应用》 CSCD 北大核心 2003年第32期174-176,共3页
首先介绍了IP组播技术的原理及其特点,然后引入防火墙技术的介绍,最后重点讨论了基于IP组播的特性的两种防火墙,并对这两种情况做了对比和总结。
关键词 IP 防火墙 IP 播地址 安全策略
下载PDF
IP组播通信技术初探
4
作者 姚德军 《今日科苑》 2011年第2期147-147,共1页
IP组播技术为群组应用提供了一种高效的传输机制,但是由于缺乏对安全性、流量管理以及可靠性等方面的有效支持,使得IP组播的应用还很受限制。其中组播安全性是关键因素之一。在IP组播通信中,对传输的数据要提供机密性、完整性以及源认... IP组播技术为群组应用提供了一种高效的传输机制,但是由于缺乏对安全性、流量管理以及可靠性等方面的有效支持,使得IP组播的应用还很受限制。其中组播安全性是关键因素之一。在IP组播通信中,对传输的数据要提供机密性、完整性以及源认证性保护。而且,由于IP组播模型的开放性,使得其极易遭受DOS攻击,因此也必须对IP组播组成员实施有效的访问控制机制。 展开更多
关键词 安全 IP成员访问控制 安全策略
下载PDF
Optimal configuration of firewall, IDS and vulnerability scan by game theory 被引量:7
5
作者 赵柳榕 梅姝娥 仲伟俊 《Journal of Southeast University(English Edition)》 EI CAS 2011年第2期144-147,共4页
The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash... The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash equilibrium for two portfolios of only deploying IDS and vulnerability scan and deploying all the technologies is investigated by backward induction. The results show that when the detection rates of IDS and vulnerability scan are low, the firm will not only inspect every user who raises an alarm, but also a fraction of users that do not raise an alarm; when the detection rates of IDS and vulnerability scan are sufficiently high, the firm will not inspect any user who does not raise an alarm, but only inspect a fraction of users that raise an alarm. Adding firewall into the information system impacts on the benefits of firms and hackers, but does not change the optimal strategies of hackers, and the optimal investigation strategies of IDS are only changed in certain cases. Moreover, the interactions between IDS & vulnerability scan and firewall & IDS are discussed in detail. 展开更多
关键词 economics of information systems FIREWALL intrusion detection system (IDS) vulnerability scan securityportfolio strategy
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部