共查询到20条相似文献,搜索用时 125 毫秒
1.
2.
3.
提出了一个基于情境的web服务安全模型,该模型通过定义高层次的策略规则,Agent能在不中止web服务运行的情况下动态控制用户的访问.通过对用户及web服务的情境信息的收集和管理,使得访问控制在决策时能够动态适应环境的变化. 相似文献
4.
5.
高杰欣 《电子产品维修与制作》2012,(22):95-96
之所以要“自上而下”,是因为大部分单位采购什么设备,实施什么策略,最终都是由领导来决策的。只有高层们认识到数据保护的重要性,下级相关部门才会主动树立和健全相应的防护措施,才有可能将安全预算放到应该的位置,甚至优先予以批复。 相似文献
6.
7.
北京启明星辰信息技术有限公司 《数据通信》2002,(2):53-56
本文为提高网络的安全性做了一些探索,介绍了一个基于动态安全管理的网络安全体系结构。通过对网络的风险进行分析、量化、建立安全模型、提供总体安全解决方案,应用安全技术与产品,建立合理的安全反应机制,实现一个可实施、可控制管理、全面的动态安全体系。 相似文献
8.
文章在分析无线网络安全现状的基础上,基于中间件整合平台的思路,提出了一个适应性强的无线安全中间件的设计方案。该中间件主要基于证书服务和密码服务,文章具体阐述了这两大模块的实现及特点.对无线网络安全的实施具有实践意义。 相似文献
9.
10.
《信息安全与通信保密》2012,(4):7-7
近日,捷德被英特尔选中为其智能手机样机的嵌入安全模块提供生命周期管理。捷德将通过空中下载方式对嵌入安全模块上的分区和密钥进行管理。英特尔在最近发布的智能手机样机上加入了除了传统SIM卡槽外的嵌入安全模块。 相似文献
11.
12.
13.
14.
基于校园网信息安全策略的研究 总被引:4,自引:1,他引:3
信息安全是学校信息化建设的根本保证,校园网在学校各项工作中发挥的作用越来越大.通过对高校校园网络中存在的信息安全隐患现状分析,采取了相应的网络安全策略.不仅需要常用的校园网信息安全防护技术,还需要将安全技术和安全管理结合起来,实现校园网络安全、实用、高效的运行. 相似文献
15.
Network security policy and the automated refinement of its hierarchies aims to simplify the administration of security services in complex network environments. The semantic gap between the policy hierarchies reflects the validity of the policy hierarchies yielded by the automated policy refinement process. However, little attention has been paid to the evaluation of the compliance between the derived lower level policy and the higher level policy. We present an ontology based on Ontology Web Language (OWL) to describe the semantics of security policy and their implementation. We also propose a method of estimating the semantic similarity between a given higher level security policy and the lower level ones to evaluate the compliance for the policy refinement approach. The method is verified in the case study. The experimental results demonstrate that the proposed method evaluates the semantic similarity between policy and implementation accurately, and that the algorithm of concept similarity analysis reflects the subjective similarity judgment of policy and implementation more accurate than the other algorithms. 相似文献
16.
语义网扩展了传统网络在信息语义上的理解,智能多代理系统作为语义网的一种部署方案也具有广泛的应用前景。本文探讨了语义网智能多代理系统面临的安全威胁,指出了由于其特点所引发的新的安全问题,以及如何建立和完善其安全机制和安全策略。 相似文献
17.
论文基于Spread组通信系统的网络结构,提出了一种面向Spread组通信系统的分布式微防火墙体系。体系采用“群组—主机”型的安全策略管理模型,利用组通信的方式发布安全策略。经过实验评估,体系在安全性、时间延迟和扩展性三个方面具有性能优势。 相似文献
18.
19.
为了适应复杂的网络环境,防火墙的规则集往往非常庞大,因此人工的方法很难保证防火墙安全策略的正确配置。文中对防火墙中异常策略的检测方法进行了深入的研究,并在此基础上给出了NP防火墙中异常策略检测模块的设计与实现。测试结果表明,该模块可以有效地检测出防火墙规则集中的各种异常,避免安全隐患的产生。 相似文献
20.
Non‐dominated sorting particle swarm optimization (NSPSO) and network security policy enforcement for Policy Space Analysis 下载免费PDF全文
Thathan Sureshkumar Mani Lingaraj Bojan Anand Thathan Premkumar 《International Journal of Communication Systems》2018,31(10)
Network operators depend on security services with the aim of safeguarding their IT infrastructure. Various types of network security policies are employed on a global scale and are disseminated among several security middleboxes implemented in networks. But, owing to the complications in security policies, it is not quite efficient to directly use the path‐wise enforcement schemes that are prevalent. The major motivation of this work is to improve security levels and solve the policy enforcement problem. For the first time, this work reports the issue of policy enforcement on middleboxes. The major contribution of this work is to design security policy enforcement as a Weighted K Set Covering Problem, and we designed a Policy Space Analysis (PSA) tool intended for a group of operations in the security policy. This PSA tool was developed based on range‐signified hyper‐rectangles, which are indexed by the Hilbert R‐tree. Leveraging the PSA, we first investigated the topological features of various kinds of policies. Balancing the PSA tool in a non‐dominated sorting particle swarm optimization technique exposes the intrinsic difficulties of this security strategy and provides guidance for designing the enforcement approach. In addition, in this research, a new fuzzy rule‐based classification system is introduced for packet classification. A scope‐wise policy enforcement algorithm was proposed, which chooses a moderate number of enforcement network nodes for deploying multiple policy subsets in a greedy manner. This scheme is much quicker compared with the first one and therefore has found its application in real‐time deployments. 相似文献