期刊文献+

多域环境的安全策略管理框架研究 被引量:7

Study on the Security Policy Management Framework in Multi-domain Environment
下载PDF
导出
摘要 安全策略在信息安全及可信计算环境中具有十分重要的作用。为了在多域环境下一致地管理和实施安全策略,提出并设计了一个可扩展的、非集中式安全策略管理框架。它使用通用、精确和中立的安全策略规范语言来描述安全策略;对各种安全模型及其安全策略进行分析,抽象出策略语义;根据安全策略模型,实现不同域、不同安全实体和不同安全设施的安全策略之间的统一接口,以便管理和控制访问、授权、加密机制、机密性、完整性和可用性等。用Java实现了一个基本的安全策略管理框架。 n security and trusted computing environments. An extensible and de-centralized security policy management framework was proposed to manage security policies consistently in multi-domain environments, This framework employs a common, precise and neutral specification language of security policies to describe security policies, analyzes the security models and its policies to extract policy semantics, and builds a security policies model framework to perform a universal API to manage and control the access, authorization, cryptograph, confidentiality, integrity and availability among the policies of different domain, entities and facilities. A basic framework of security policies was implemented in Java language.
出处 《四川大学学报(工程科学版)》 EI CAS CSCD 北大核心 2006年第2期114-117,共4页 Journal of Sichuan University (Engineering Science Edition)
基金 国家自然科学基金资助项目(10076011)
关键词 安全策略 安全策略管理框架 信息安全 自治域 多域 security policy security policies management framework information security autonomous domain multi-domain
  • 相关文献

参考文献4

  • 1NSF.Cyber trust[EB/OL].2005.http://www.nsf.gov/publications/pub-summ.jsp?ods-key=nsf05518. 被引量:1
  • 2Blaze M,Keromytis A,Richardson M,et al.IP security policy (IPSP) requirements[EB/OL].2003.http://www.ietf.org/rfc/rfc3586.txt. 被引量:1
  • 3陈炜,罗霄峰,罗万伯.一种用于信息安全的信息保障模型[J].四川大学学报(工程科学版),2004,36(4):103-106. 被引量:5
  • 4Lymberopoulos L,Lupu E,Sloman M.PONDER policy implementation and validation in a CIM and differentiated services framework[C].The 9th IEEE/IFIP Network Operations and Management Symposium (NOMS 2004).Seoul,Korea,2004:101-106. 被引量:1

二级参考文献4

  • 1[2]Bell,La Padula L.Secure computing systems:mathematical foundation and model[R].MITRE Report,MTR 2547 v2,1973. 被引量:1
  • 2[3]McCumber J.Information systems security:a comprehensive model[A].Proceedings 14th National Computer Security Conference[C].Baltimore,MD,USA,1991.124~129. 被引量:1
  • 3[4]Maconachy W V,Schou C D.A model for information assurance:an integrated approach[A].Proceedings of the 2001 IEEE Workshop on Information Assurance Security[C].NY,2001.180~185. 被引量:1
  • 4[5]Whitman M E,Mattord H J.Principles of information Security[M].Thomson Learning,2003.132~133. 被引量:1

共引文献4

同被引文献41

引证文献7

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部