[1]肖庆 焦健.网络安全策略与措施的语义一致性研究[J].计算机技术与发展,2011,(08):220-222.
 XIAO Qing,JIAO Jian.Research on Semantic Consistency of Network Security Policy and Measure[J].,2011,(08):220-222.
点击复制

网络安全策略与措施的语义一致性研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2011年08期
页码:
220-222
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
Research on Semantic Consistency of Network Security Policy and Measure
文章编号:
1673-629X(2011)08-0220-03
作者:
肖庆1 焦健2
[1]广西师范大学历史文化与旅游学院[2]北京信息科技大学计算机学院
Author(s):
XIAO QingJIAO Jian
[1]Dept.of History Culture and Tourism,Guangxi Normal University[2]School of Computer Science and Engineering,Beijing Info.Sci.& Techn.Univ
关键词:
策略措施语义一致性
Keywords:
policy measure semantic consistency
分类号:
TP393.08
文献标志码:
A
摘要:
计算机网络安全中以防火墙和入侵检测为代表的安全措施需要由高层策略转换得出。但在转换过程中由于机械规则的影响,策略与措施间语义的内容可能不一致。文中提出了一种用于计算策略到措施的语义度量方法,针对典型的ponder策略建立其语言结构化操作语义模型,规定高层策略到底层措施的转换规则,根据特定网络环境和事件,构造相关的推理引擎,能够自动实现底层措施到高层策略的语义度量。实验结果表明,该方法可以有效地实现策略和底层措施之间的在语义上存在的差异
Abstract:
In the computer network security,the measures using in firewall and IDS are changed by policy.Because the machine rules are used in the process,the measure is not consistency with the policy.Propose a method to measure semantic between the policy and measure.It makes the semantic model based on ponder with operation semantic,design the rule to transform policy to measure,using these rules to finish engine in order to compute the consistency automatically by the specific network environment and event.The experiment shows that the method can analyse consistency for semantics between policy and measure effectively

相似文献/References:

[1]李亚楠 刘连忠 贾燚星.数据交换研究[J].计算机技术与发展,2008,(02):5.
 LI Ya-nan,LIU Lian-zhong,JIA Yi-xing.Sui-vey on Data Exchange[J].,2008,(08):5.
[2]于琳 李捷.基于策略和代理的无线传感器网络数据管理架构[J].计算机技术与发展,2008,(06):182.
 YU Lin,LI Jie.Data Management Framework for Wireless Sensor Network Using Agent and Policy Technology[J].,2008,(08):182.
[3]续亚锋 陈志国 李涵.用WSE构建安全可靠的Web Services[J].计算机技术与发展,2008,(08):155.
 XU Ya-feng,CHEN Zhi-guo,LI Han.Construction of a Safe and Reliable Web Services with WSE[J].,2008,(08):155.
[4]王力生 康珊.嵌入式系统的动态功耗管理结构[J].计算机技术与发展,2008,(08):188.
 WANG Li-sheng,KANG Shan.A DPM Architecture of Embedded Systems[J].,2008,(08):188.
[5]陈群 周健.无线局域网安全认证的EAP策略[J].计算机技术与发展,2008,(09):123.
 CHEN Qun,ZHOU Jian.EAP Strategy of WLAN's Security Authentication[J].,2008,(08):123.
[6]金奎 程家兴 李志俊 饶玉佳.基于佳点集遗传算法的足球机器人策略设计[J].计算机技术与发展,2008,(11):123.
 J IN Kui,CHENG Jia-xing,LI Zhi-jun,et al.Design of Soccer Robot Strategy Based on Good- Point Set Genetic Algorithm[J].,2008,(08):123.
[7]许丽婷 董丽丽.CORBA中POA策略研究[J].计算机技术与发展,2007,(01):60.
 XU Li-ting,DONG Li-li.The Research of POA's Policy in CORBA[J].,2007,(08):60.
[8]贾丽艳 魏衍召.数据交换传输安全模型设计及实现[J].计算机技术与发展,2012,(01):209.
 JIA Li-yan,WEI Yan-zhao.Design and Implementation of Security Model in Transmission of Data Exchange[J].,2012,(08):209.

备注/Memo

备注/Memo:
国家863信息安全重点专项(2007AA01Z407)肖庆(1964-),女,广西柳州人,讲师,主要研究方向为计算机网络安全
更新日期/Last Update: 1900-01-01