Study on the Policy Conflict Detection in the Security Management Model

被引:0
|
作者
Shen, Liang [1 ]
Wang, Zhijia [1 ]
Zhang, Xiaoxiao [1 ]
Gu, Jian [1 ]
机构
[1] Minist Publ Secur, Res Inst 3, Shanghai, Peoples R China
关键词
security policy; policy description; policy classification; policy conflict detection; policy conflict library;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Through using the concept of deontic logic and classifying different types of policy conflicts, an effective policy conflict detection method was proposed. The main idea of the method is based on the research on the existing policy conflict detection methods. Then, a powerful conflict library in the detection process is built. The library is combined with the static and dynamic detection of policy conflicts, and thus is able to supervise the running state of the management system. Therefore, the proposed method can precisely detect policy conflicts during the run-time of the management system.
引用
收藏
页码:52 / 56
页数:5
相关论文
共 50 条
  • [1] Security Policy Conflict Detection for Distributed System
    Zhang, AiJuan
    Ji, Cheng
    Wang, Jian
    [J]. ADVANCED RESEARCH ON MATERIAL ENGINEERING, CHEMISTRY AND BIOINFORMATICS, PTS 1 AND 2 (MECB 2011), 2011, 282-283 : 173 - +
  • [2] IPSec/VPN security policy: Correctness, conflict detection, and resolution
    Fu, Z
    Wu, SF
    Huang, H
    Loh, K
    Gong, FM
    Baldine, I
    Xu, C
    [J]. POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2001, 1995 : 39 - 56
  • [3] Russian conflict management and European security governance: policy and practice
    Haenche, Felix
    [J]. INTERNATIONAL AFFAIRS, 2022, 98 (02) : 795 - 796
  • [4] DETECTION AND DEFECTION - SECURITY REGIMES AND THE MANAGEMENT OF INTERNATIONAL CONFLICT
    STEIN, JG
    [J]. INTERNATIONAL JOURNAL, 1985, 40 (04): : 599 - 627
  • [5] A usability study of security policy management
    Herzog, Almut
    Shahmehri, Nahid
    [J]. SECURITY AND PRIVACY IN DYNAMIC ENVIRONMENTS, 2006, 201 : 296 - +
  • [6] A Method of Conflict Detection And Resolution for Security Policy Based on Matrix Description
    Chen, Ming
    Hong, Jianxun
    Xiao, Youan
    Long, Yihong
    [J]. PROCEEDINGS OF 2017 IEEE 7TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC), 2017, : 548 - 551
  • [7] Policy-driven model for security management
    Boudaoud, K
    McCathieNevile, C
    [J]. NETWORK CONTROL AND ENGINEERING FOR QOS, SECURITY AND MOBILITY, 2003, 107 : 419 - 424
  • [8] Russian Conflict Management and European Security Governance. Policy and Practice
    Geukjian, Ohannes
    [J]. EUROPE-ASIA STUDIES, 2022, 74 (05) : 886 - 888
  • [9] Dynamic conflict detection in policy-based management systems
    Dunlop, N
    Indulska, J
    Raymond, K
    [J]. SIXTH INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, PROCEEDINGS, 2002, : 15 - 26
  • [10] Integrated Model of Security Policy in Database Management System
    Boichenko, I. A.
    Sarajkin, V. G.
    [J]. LESNOY ZHURNAL-FORESTRY JOURNAL, 2005, (05) : 133 - +