首页 | 本学科首页   官方微博 | 高级检索  
     

基于逻辑和辩论的安全策略一致性研究
引用本文:翟浩良,韩道军,李磊.基于逻辑和辩论的安全策略一致性研究[J].计算机科学与探索,2012,6(4):355-365.
作者姓名:翟浩良  韩道军  李磊
作者单位:1. 中山大学软件研究所,广州,510275
2. 中山大学软件研究所,广州510275;河南大学数据与知识工程研究所,河南开封475004
基金项目:高等学校博士学科点专项科研基金No.20110171120054;广东省自然科学基金No.S2011040001869~~
摘    要:冲突检测和冲突消解是策略一致性研究的两个主要方向。现有的冲突检测算法时间复杂度高,且缺乏灵活性和扩展性。改变策略条件和基于优先级的冲突消解方法容易引起新的不一致性问题,而且优先权的赋予带有主观因素,难以实现。在此基础上,使用逻辑对策略和策略冲突进行形式化描述和分析,并提出了一种基于逻辑合一思想的多项式时间内的策略一致性检测算法;把策略冲突分为包容冲突、相交冲突和互补冲突,给出了一种包容冲突和相交冲突的自动解决方法,证明了该方法的可行性和完备性;利用辩论机制和理论对策略互补冲突进行了语义分析,为基于优先级的解决方案提供了理论基础;提出了一种策略互补冲突下的一致性策略子集的计算算法,并进行了复杂度分析。

关 键 词:安全策略  一致性  逻辑  辩论

Research on Consistency of Security Policy Based on Logic and Argument
ZHAI Hao-liang , HAN Dao-jun , LI Lei.Research on Consistency of Security Policy Based on Logic and Argument[J].Journal of Frontier of Computer Science and Technology,2012,6(4):355-365.
Authors:ZHAI Hao-liang  HAN Dao-jun  LI Lei
Affiliation:1.Software Research Institute,Sun Yat-Sen University,Guangzhou 510275,China 2.Institute of Data and Knowledge Engineering,Henan University,Kaifeng,Henan 475004,China
Abstract:Conflict detection and resolution are the two main research directions on consistency of security policy.Existing consistency detection methods take a high time complexity and are lack of flexibility and expansibility.Changing policy conditions and priority-based conflict resolution may generate new conflicts,and assignments of policy priority are within subjective factors and difficult to implement.Based on the above consideration,this paper formalizes and analyzes policy and policy conflict by logic,and proposes a polynomial time algorithm for consistency detection based on logic unify concept.Then it classifies the policy conflicts into inclusive conflict,intersectant conflict and complementary conflict,proposes an automatic solution for inclusive and intersectant conflicts,and demonstrates the feasibility and completeness of the method.Furthermore,it uses the mechanism and theory of debate to analyze the semantic of policy conflict which provides a theoretical basis for priority-based solution,proposes a consistency policy subset computational algorithm and analyzes its complexity.
Keywords:security policy  consistency  logic  argument
本文献已被 CNKI 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号