多策略支持下的策略冲突检测与消解研究-计算机应用技专业论文.docxVIP

  • 18
  • 0
  • 约6.28万字
  • 约 77页
  • 2018-10-21 发布于上海
  • 举报

多策略支持下的策略冲突检测与消解研究-计算机应用技专业论文.docx

多策略支持下的策略冲突检测与消解研究-计算机应用技专业论文

华中科技大学硕士学位论文 华 中 科 技 大 学 硕 士 学 位 论 文 I I 摘 要 访问控制技术通过制定某种控制策略来保障系统的安全性,其主要目的在于保 护系统资源不被非法用户访问或者被合法用户非法访问。然而多条访问控制策略可 能因为不同的需求,会造成不同的访问授权结果。这些不一致将会导致策略冲突。 若一个系统中存在策略冲突,将会因为冲突导致策略失效。当策略冲突大量的存在 时,将会耗费大量的系统资源,甚至导致系统崩溃。 国内外对策略冲突的大部分研究都是运用策略描述语言,通过逻辑推导的方式 完成相应的冲突检测和消解。这些研究往往只针对某单一访问控制模型下的策略冲 突。对多种访问控制模型共同作用下的策略冲突问题却较少提及。针对上述问题, 提出了一种多策略支持下的策略冲突检测与消解模型,通过主体与客体域有向图模 型,将策略冲突的检测问题转化为有向图中求节点的连通节点问题,然后使用策略 组合的方式完成策略冲突的消解。同时针对访问控制系统中安全策略与效用策略共 存时的非一致性冲突问题,提出了一种基于优先级的冲突消解方法。该消解方法能 保证当策略数目较少时,快速有效地完成非一致性冲突的消解过程。 最后,在结合上述理论研究的基础上,实现了多策略安全访问标签库系统的策 略解析模块,完成了相应的检测与消解算法。 关键词:访问控制,策略冲突,非一致性冲突,冲突检测,冲突消解 II II Abstract Access control technology protects the security of application system by developing a control strategy. Its main purpose is to protect system resources from unauthorized user access, or unauthorized access by legitimate users. However, a number of access control policies may cause different authorization result because they are made for different reasons. These inconsistencies will lead to policy conflicts. If there is a policy conflicts in the system, it will lead to a policy failure. When there are a large number of policy conflicts, much system resources would be expended and even a system crash would happen. Policy conflict has been deeply studied at home and abroad. Most of these studies utilize policy description language to descript the access control policy and resolves issues such as conflict detection and resolution by logistic reasoning. However, these studies always focus on the policy conflict in a single access control model. Sometimes, the policy requirement is more complex and a variety of policies in different access control models are needed. a Policy Conflict Detection and Resolution model under the multi-policy Environments is carefully discussed in this paper. The main propose of the model is to solve the policy conflict detection and resolution problem while the system is controlled by multi-strategy under different access control model. The conflict

您可能关注的文档

文档评论(0)

1亿VIP精品文档

相关文档