Similarity Analysis on Heterogeneous Security Policy

被引:0
|
作者
Chen, Chen [1 ]
Sun, Yuqing [1 ]
Pan, Peng [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan, Peoples R China
关键词
Security Policy; Similarity; Semantics;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
To support efficient cooperation among different organizations in pervasive computing environment, it is an important issue to compare the similarity among different security policies so as to authorize appropriate rights to each other. Although there is much work on security policy similarity comparison, most of them are based on the same concept structure, which is not suitable for pervasive environment where security policies are always based on heterogeneous concept structures. In this paper, we propose a novel approach to compute the similarity between security policies, which is in two processes. Firstly, analysis and integration is on different concept structures by semantic merging. Then each rule of the security policies is mapped to the integrated structure and the similarity between them is calculated. We propose the relevant algorithms and calculation methods. The experiments are made on both efficiency and effectiveness and results show that our approach is well solving the similarity analysis of heterogeneous security policy.
引用
收藏
页码:682 / 687
页数:6
相关论文
共 50 条
  • [1] Security Policy Configuration Analysis for Web Services on Heterogeneous Platforms
    Ji Hongbin
    Zhao Fengyu
    Xu Tao
    [J]. INTERNATIONAL CONFERENCE ON APPLIED PHYSICS AND INDUSTRIAL ENGINEERING 2012, PT B, 2012, 24 : 1422 - 1430
  • [2] Hierarchical policy model for managing heterogeneous security systems
    Lee, Dong-Young
    Kim, Minsoo
    [J]. COMPUTATION IN MODERN SCIENCE AND ENGINEERING VOL 2, PTS A AND B, 2007, 2 : 558 - +
  • [3] Optimal Security Policy for Protection Against Heterogeneous Malware
    Taynitskiy, Vladislav
    Gubar, Elena
    Zhu, Quanyan
    [J]. NETWORK GAMES, CONTROL, AND OPTIMIZATION, 2017, : 199 - 209
  • [4] Research in Analysis IT Security Policy and Security Solution
    Liao, Kai
    Li, Feng
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON MECHANICAL, ELECTRONIC AND ENGINEERING TECHNOLOGY (MEET 2019), 2019, : 180 - 184
  • [6] Towards effective security policy management for heterogeneous network environments
    Teo, Lawrence
    Ahn, Gail-Joon
    [J]. EIGHTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS - PROCEEDINGS, 2007, : 241 - +
  • [7] A Study on Hierarchical Policy Model for Managing Heterogeneous Security Systems
    Lee, DongYoung
    Ahn, Sung-Soo
    Kim, Minsoo
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2011, PT IV, 2011, 6785 : 225 - 234
  • [8] Integrating Heterogeneous Security Knowledge Sources for Comprehensive Security Analysis
    Wang, Guodi
    Li, Tong
    Yue, Hao
    Yang, Zhen
    Zhang, Runzi
    [J]. 2021 IEEE 45TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2021), 2021, : 714 - 724
  • [9] Security Analysis of Hybrid Security Mechanisms for Heterogeneous Sensor Networks
    Sain, Mangal
    Kim, Ki Hwan
    Lee, Hoon Jae
    [J]. 2017 19TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - OPENING NEW ERA OF SMART SOCIETY, 2017, : 188 - 192
  • [10] Analysis of network security requirement and security policy research
    [J]. 2000, Shanghai Comp Soc, China (26):