用户名: 密码: 验证码:
安全策略转换关键技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
在分布式网络环境下,为保护信息系统使其免受基于网络的攻击,采用了越来越多的安全机制,安全管理员需要处理大量复杂、异构的配置,工作量大、出错率高。因此,协助管理员完成安全策略配置任务的自动工具和自动化方法引起了足够的关注。
     安全策略转换是实现策略自动配置的基本手段,安全策略冲突检测是实现策略正确配置的根本保证。本文对安全策略转换和冲突检测技术进行了系统而深入的研究。本文的主要工作如下:
     1、分析了策略转换和冲突检测技术的研究现状,指出了存在的主要问题,明确了本文的研究范围和基本思路。
     2.剖析了策略、安全策略的概念及策略分类准则,在分析国内外研究现状的基础上,给出了常见的安全策略分类,系统归纳了安全策略、安全策略层次和安全策略转换等基本概念。
     3、首次提出了基于应用层/服务层/设备层三层结构的安全策略转换模型,定义了模型的基本元素、基本操作、基本转换规则,并以实际环境中的访问操作为例,证明了安全策略转换过程的有效性,为实现安全策略转换提供了理论支撑。
     4、在分析安全策略关系的基础上,建立了安全策略冲突模型,提出了一种新的安全策略冲突分类和冲突表示方法,给出并证明了一系列冲突定理,为判断安全策略冲突条件、确定安全策略冲突类型提供了理论支撑。
     5、基于安全策略冲突模型,采用规范化、离散化的思想和矩阵结构,设计实现了一套与应用松耦合的安全策略冲突检测和冲突消解算法,分析了算法的性能和正确性。
     6、基于安全策略转换模型,设计了安全策略层间转换算法,提出了一种以翻译脚本担任中间角色的策略翻译方法,解决了由面向策略编辑者的抽象描述级策略到面向各类设备底层配置接口的层层转换问题。
     7、设计并实现了具有安全策略转换、安全策略冲突检测和冲突消解功能的转换系统。
The current network environments incorporate an ever increasing variety of security mechanisms in order to fulfill the protection needs against network-based attacks. Security administrators need dealing with a number of complicated and different configurations.The workload is large and the error rate is high. Therefore, automated tools and methodologies are of high interest to assist security policy configuration tasks. Security policy transformation is a basic means for automatic policy configuration. Security policy conflict detection is an essential guarantee for correct policy configuration. This paper mainly focuses on the security policy transformation and conflict detection techniques. The main works and contributions are summarized as follows:
     1. Summarized the related work of technologies of policy transformation and policy conflict detection, pointed out existent problems, and determined the research scope of this paper.
     2. Studied the concepts of the policy, security policy and policy classification criterion. On the basis of analyzing the existing research work, we have proposed the familiar security policy classification, then put forward the concepts of security policy, security policy hierarchy and security policy transformation systematically.
     3. Put forward a security policy transformation model based on Application Level/Service Level/Device Level, including the definion of some basic elements, operation functions, transformation rules, the correlative theorems and attestation of policy transformation validation, which provided the theoretical support for realizing security policy transformation.
     4. Put forward a security policy conflict model based on analyzing the relation of the security policy, including a new security policy conflict classification, conflict denotation and some conflict theorems, which provided the theoretical support for estimating security policy conflict conditions and ascertaining security policy conflict classification.
     5. On the basis of the security policy conflict model, adopted the matrix and the idea of standardization/discretization to design and realize security policy conflict detection and resolution arithmetics, which is loosely coupled with the application, then analysed the capability and correctness of the arithmetics.
     6. On the basis of the security policy transformation model, designed the security policy transformation arithmetics between adjacent two levels, and proposed a policy translation method using macro policy and translation script, which resolved the transformation problems from the abstract specification level facing the policy editors to the configuration interface facing all kinds of underlying devices.
     7. Designed and implemented a security policy transformation system which can support security policy transformation, security policy conflict detection, and security policy conflict resolution.
引文
[1] HAYTON, R. J., J. M. BACON, ET AL. Access Control in an Open Distributed Environment[C]. IEEE Symposium on Security and Privacy, Oakland, California, U.S.A. 1998: 3-14.
    [2] AHN, G.-J.AND R. SANDHU. The RSL99 Language for Role-based Separation of Duty Constraints[C]. Fourth ACM Workshop on Role-Based Access Control, Fairfax, Virginia, USA, ACM Press. 1999.
    [3] E. Bertino, P. A. Bonatti and E. Ferrari. TRBAC: A temporal role-based access control model [J]. ACM Trans. on Information and System Security, 2001, 4(3): 191-233.
    [4] JAJODIA, S., P. SAMARATI, ET AL. A Logical Language for Expressing Authorizations[C]. IEEE Symposium on Security and Privacy, Oakland, USA, IEEE. 1997:31-42.
    [5] ORTALO, R. A Flexible Method for Information System Security Policy Specification[C].5th European Symposium on Research in Computer Security (ESORICS 98), Louvain-la-Neuve, Belgium, Springer-Verlag. 1998.
    [6] Wieringa, R. J. and J. C. Merer. Applications of Deontic Logic in Computer Science: A Concise Overiew[C]. Practical Reasoning and Rationality (PRR 98), Brighton, UK, John Wiley &Sons. 1998.
    [7] RIBEIRO, C., A. ZUQUETE, ET AL. SPL: An access control language for security policies with complex constraints[C]. Network and Distributed System Security Symposium (NDSS’01). 2001.
    [8] OASIS(Organization for the Advancement of Structured Information Standards) (2001), XACML language proposal[S], version 0.8, available from http://www.oasis-open.org/committees/xacml,10 January 2002.
    [9] HOAGLAND, J. A., R.PANDEY, ET AL. Security Policy Specification Using a Graphical Approach [J]. UC Davis Computer Science Department. 1998:23.
    [10] Lobo J, Bhatia R, Naqvi S. A Policy Description Language. In: Proceedings of the Sixteenth National Conference on Artificial Intelligence (AAAI' 99), Orlando, Florida, USA. 1999:291-298.
    [11] Damianou, N., N. Dulay, E. Lupu and M.Sloman. Ponder: A Language for Specifying Security and Management Policies for Distributed Systems. v2.0 [R]. Imperial College Research Report DoC 2000/1, London, 2000:12-30.
    [12]杨海松,基于策略管理的分布式、动态网络安全模型[D].合肥:中国科学技术大学,2003.
    [13] Kim Jangha.I,ee Kanghee,Kim Sangwook,el a1.A High Level Policy Description Language for the Network ACL[G]//LNCS 3320:Proc of Parallel and Distributed Computing,Applications and Technologies.New York:Springer. 2004:748-751.
    [14] Tang Chenghua, Yao Shuping, Cui Zhongjie, et a1. A Network Security Policy Model and its Realization Mechanism. Information Security and Cryptology[G]//LNCS 4318.New York:Springer,2006:168-181.
    [15] IETF策略框架工作组http://www.ietf.org/html.charters/policy-charter.html.
    [16]夏春和,魏玉娣,李肖坚,王海泉,何巍.计算机网络防御策略描述语言研究[J].计算机研究与发展. 2009, 46(1):89-99.
    [17] Qingfeng He, Annie I. Antón. Requirements-based Access Control Analysis and Policy Specification(ReCAPS)[J]. Information and Software Technology. 2009, 51:993–1009.
    [18] B. Moore, E. Ellesson, J. Strassner and A. Westerinen. Policy Core Information Model–Version 1 Specification, RFC 3060, February 2001.
    [19] B. Moore, Policy Core Information Model Extensions, RFC 3460, Policy Framework, January 2003.2.
    [20] E. Lupu and M. Sloman Conflicts in Policy-based Distributed Systems Management[C] IEEE Transactions on Software Engineering Management-Special Issue on Inconsistency Management, 1999, 25(6):852-869.
    [21] J. Chomicki, J. Lobo and S. Naqvi. A Logic Programming Approach to Conflict Resolution in Policy Management[C], In Proc. of 7th International Conference on Principles of Knowledge Representation and Reasoning (KR2000). Breckenridge, Colorado, USA. 2000: 121-132.
    [22] D. Verma. Simplifying Network Administration using Policy based Management [J]. IEEE Network Magazine, 2002 ,16(2):20-26.
    [23] Javier Baliosian and Joan Serrat. Finite State Transducers for Policy Evaluation and Conflict Resolution [J]. POLICY 2004.
    [24] Cataldo Basile, Antonio Lioy, Towards an Algebraic Approach to Solve Policy Conflicts[C], FCS'04, 2004:319-338.
    [25] Hari, A., Suri, S. and Parulkar, G. (2000), Detecting and resolving packet filter conflicts[C], in Proc of the 19th Annual Joint Conference of the IEEE Computer and Communications Societies, (INFOCOM, 2000), pp. 1203-1212.
    [26] Alfaro, J. G., Cuppens, F., and Cuppens-Boulahia, N, Towards Filtering and Alerting Rule Rewriting on Single-Component Policies[C]. In Intl. Conference on Computer Safety, Reliability, and Security, Poland, 2006:182-194.
    [27]王卫平、陈文惠,防火墙规则配置错误分析及其检测算法[J],计算机应用,2005, 25(10):2269-2272.
    [28] A. Mayer, A. Wool and E. Ziskind, Fang: A Firewall Analysis Engine[C], Proceedings of 2000 IEEE Symposium on Security and Privacy, May 2000:177-187.
    [29] A. Wool, Architecting the Lumeta Firewall Analyzer[C], Proceedings of 10 USENIX Security Symposium, August 2001.
    [30] P. Eronen and J, Zitting. An Expert System for Analyzing Firewall Rules[C], Proceedings of 6 Nordic Workshop on Secure IT-Systems (NordSec 2001), November 2001.
    [31] Fu, Z., Wu, S., Huang, H., Loh, K., Gong, F., Baldine, I. and Xu, C. (2001), IPSec/VPN Security Policy: Correctness, Conflict Detection and Resolution[C]. In Proc. of the IEEE International Workshop on Policies for Distributed Systems and Networks, (Policy 2001), 2001:39-56.
    [32] Al-Shaer, E. and Hamed, H. Firewall Policy Advisor for Anomaly Detection and Rule Editing[C]. In Proc. of the Eight IEEE/IFIP International Symposium on Integrated Network Management. 2003:17-30.
    [33] F. Cuppens, N. Cuppens-Boulahia, T. Sans, and A. Miege. A formal approach to specify and deploy a network security policy[C]. In Second Workshop on Formal Aspects in Security and Trust, 2004:203-218.
    [34]何再朗,田敬东等,策略冲突分析、检测及解决方案[J],兰州理工大学学报,2005, 31(5):83-86.
    [35]何再朗,田敬东,张毓森,策略冲突类型的细化及检测方法的改进[J],吉林大学学报(信息科学版),2005:287-293.
    [36]韩智文,龚正虎,荣霓,报文过滤策略的逻辑表示及冲突解决方法[J] ,电子学报,2005,33(12):2517-2523.
    [37]于海波,车海燕,金淳兆,基于描述逻辑的RB-RBAC授权规则冲突检测方法[J],计算机科学,2006,33(10):101-105.
    [38] Hamed, H., Al-Shaer, E. and Marrero, W. (2005), Modeling and Verification of IPSec and VPN Security Policies[C]. In Proc. of the 13th IEEE International Conference on Network Protocols, (ICNP, 2005), 2005:259-278.
    [39] Arosha K Bandara, A Formal Approach to Analysis and Refinement of Policies (PhD Thesis), Imperial College London University of London, July 2005.
    [40] Lin, C., Xue, C. and Zhitang, L. (2006), Analysis And Classification of IPSec Security Policy Conflicts[C]. In Proc. Japan-China Joint Workshop on Frontier of Computer Science and Technology, (FCST 2006), 2006:83-88.
    [41] Steven Davy, Brendan Jennings, John Strassner. The Policy Continuum-Policy Authoring and Conflict Analysis [J]. Computer Communications. 2008, 31:2981-2995.
    [42] Wahl, M., etc. Lightweight Directory Access Protocol (v3), RFC2251, December 1997.
    [43] Durham, D., J. Boyle, R. Cohen, S. Herzog, R. Rajan, and A. Sastry. The COPS (Common Open Policy Service) Protocol, RFC2748, January 2000.
    [44] Dulay, N., E. Lupu, M. Sloman and N. Damianou. A Policy Deployment Model for the Ponder Language[C]. In Proceedings of the 7th IFIP/IEEE International Symposium on Integrated Network Management (IM’2001): Integrated Management Strategies for the New Millennium, Seattle, Washington, 2001:529-544.
    [45] (美)惠特曼(Whitman,A.E.),(美)马特奥德(Mattord,H.J.).信息安全管理[M].向宏、傅鹂主译.重庆大学出版社.
    [46] Travis D. Breaux and Annie I. Antón Clare-Marie Karat and John Karat. Enforceability vs. accountability in electronic policies[C]. In Proceedings of the Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY’06), 2006: 227-230.
    [47] Jonathan D. Moffett and Morris Sloman. The Source of Authority for Commercial Access Control[J]. IEEE Computer, 1988, 21(2):59-69.
    [48] J. D. Moffett and Morris Sloman. The Representation of Polices as System Objects[C]. In Proceedings of the Conference on Organizational Computer Systems (COCS’91), Atlanta, Georgia, November 5-8. 1991:171-184.
    [49] Sloman, M. Sloman. Policy Driven Management for Distributed Systems [J]. Journal of Network and Systems Management, 1994, 2(4):333-360.
    [50] Sloman M., Lupu E.. Conflict Analysis for management Policies[C], In Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management. San Diego, California, Chapman and Hall. 1997: 430-443.
    [51] Emil C. Lupu, Damian A. Marriott, Morris Sloman and Nicholas Yialelis. A Policy Based Role Framework for Access Control[C]. In First ACM NIST Role Based Access Control Workshop, Gaithersburg, USA, 1995.
    [52] Emil C. Lupu and Morris Sloman. A Policy Based Role Object Model[C]. In Proceedings of the First International Enterprise Distributed Object Computering Workshop (EDOC’97), Queensland, Australia, 1997:24-26.
    [53] Emil C. Lupu, Morris S Sloman, Reconciling Role Based Management and Role Based Access Control[C]. In Proceedings of the Second Role Based Access Control Workshop (RBAC'97), George Mason University, Virginia, USA, 1997:135-141.
    [54] Emil C. Lupu, Morris Sloman. Towards a Role Based Framework for Distributed Systems Management [J]. Journal of Network and Systems Management, 1997, 5(1).
    [55] Wies R. Using a Classification of Management Policies for Policy Specification and Policy Transformation[C]. In Proceedings of the Fourth International Symposium on Integrated Network Management (ISINM '95), Santa Barbara, California, Chapman and Hall. 1995: 44-56.
    [56] Cheh Goh. A Generic Approach to Policy Description in System Management[C]. In Proceedings of the 8th IFIP/IEEE international workshop on Distributed Systems Operations & Management (DSOM’97). Sydney, Australia. 1997:1-12.
    [57] A Westerinen, J. Schnizlein, J. Strassner, et al. Terminology for Policy based Management [EB/OL]. Internet Engineering Task Force, RFC 3198, 2001. http://www.ietf.org.
    [58] N Damianou. A Policy Framework for Management of Distributed Systems [D]. London: Technology and Medicine of London University, February 2002.
    [59] Jovan Cakic. A High-level Framework for Policy-based Management of Distributed Systems [D]. December 2003.
    [60] Ebenezer A. Oladimeji, Sam Supakkul, LawRence Chung. Representing Security Goals, Policies, and Objects[C]. In Proceedings of the 5th IEEE/ACIS International Conference on Computer andInformation Science and 1st IEEE/ACIS International Workshop on Component-based Software Engineering, Software Architecture and Reuse, 2006.
    [61] Alpers, B., Plansky, H. Concepts and Application of Policy-Based Management[C]. In Integrated Network Management IV. Chapman Hill, London. 1995:57-68.
    [62]冯登国.网络安全原理与技术[M],科学出版社, 2003.
    [63]田涛.基于防火墙的企业网络安全策略及实现技术研究[D].北京:中国科学院研究生院硕士学位论文,2004.07.
    [64] Matt Bishop著.计算机安全学-安全的艺术与科学[M].王立斌,黄征等译.电子工业出版社. 2005年.
    [65] R.Wies. Policy Definition and Classification: Aspects, Criteria, and Examples. 1994.
    [66] M. Sloman and E. C. Lupu. Security and Management Policy Specification[C]. IEEE network, Special Issue on Policy-Based Networking. 2002, 16(2):10-19.
    [67] Kevin Twidle, Emil Lupu. Ponder2: policies [EL/OB]. http://www-dse.doc.ic.ac.uk/policies, 2007.
    [68] Interagency Working Group (IWG) on Cyber Security and Information Assurance (CSIA). Federal Plan for Cyber Security and Information Assurance[R]. National Coordination Office for Networking and Information Technology Research and Development (NCO/NITRD) .2006.4.
    [69] Moffett, J. D. and Sloman, M. S. The Representation of Policies as System Objects[C]. Proceedings of the Conference on Organizational Computer Systems, Vol.12 of SIGIOS Bulletin. 1991:171-184.
    [70] RenéWies. Policies in Integrated Network and Systems Management: Methodologies for the Definition, Transformation, and Application of Management Policies [D]. Department of Computer Science, University of Munich. 1995.
    [71] Thomas Koch, Christoph Krell and Bernd Kr?mer. Policy Definition Language for Automated Management of Distributed Systems[C]. In The Second International Workshop on Systems Management, Toronto, Canada: IEEE Computer Society, June 1996, 19-21.
    [72] Christian Schaefer, Thomas Walter. Security policies-specification, enforcement and applications [R]. DoCoMo Communications Laboratories. Europe GmbH. 2005.
    [73] J. Moffett and M Sloman. Policy Hierarchies for Distributed Systems Management [J]. IEEE JSAC Special Issue on Network Management. 1993, 11(9):1404-1414.
    [74] M. Masullo and S. Calo. Policy Management: An Architecture and Approach[C]. In Proc. of the IEEE First International Workshop on Systems Management. Los Angeles, IEEE. 1993: 14-16.
    [75] Francis St-Onge, David Kidston, Isabelle Labbé. A Multi-level Policy Representation for Management Services in Maritime Networks [C]. Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07). 2007.
    [76] D.C. Verma. Policy-base Networking: Architecture and Algorithm [M]. New Riders Publishing. 2001.
    [77] Strassner, J.. Policy-Based Network Management [M]. Morgan Kaufmann. ISBN 1-55860-859-1, 2003.
    [78]姚键.基于策略的安全管理研究与实现[D].南京大学博士学位论文, 2005.11.
    [79]亢嵛.基于多层策略网络管理系统研究[D].中南大学硕士学位论文, 2005.04.
    [80] M. Abrams and D. Bailey. Abstraction and refinement of layered security policy[C]. In M. Abrams, S. Jajodia, and H. Podell, editors, Information Security: An Integrated Collection of Essays. IEEE Computer Society Press, Los Alamitos, California, USA, 1994:126-136.
    [81] Jo?o Porto de Albuquerque, Heiko Krumm. Policy Modeling and Refinement for Network Security Systems[C]. In: B.Firozabadi, W.Winsborough, A.Sahai (eds.).Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks. Washington, DC, USA: IEEE Computer Society, 2005. 24-33.
    [82] Beigi, M.S.; Calo, S.;Verma, D.. Policy Transformation Techniques in Policy-based Systems Management[R]. In Proceedings of the Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, NY, USA, June 2004, 13-22.
    [83]吴蓓、陈性元、张永福、赵亮、代向东.基于宏策略的策略翻译方法[J].计算机工程, 2008, 34(4):54-56,62.
    [84] M. Casassa, A. Baldwin, C. Goh. POWER prototype: towards integrated policy-based management[C]. IEEE/IFIP Network Operations and Management Symposium, NOMS 10-14 April 2000, Honolulu, Hawaii USA, 2000:126-141.
    [85] Bean, A., Wood, D., Fairclough, W.. Specifying Goal-oriented Network Management Systems [J]. IEEE Communications Magazine, 1993, 31(5):30–36.
    [86] Axel van Lamsweerde. Goal-Oriented Requirements Analysis with KAOS[C]. In the First International Workshop on Policies for Distributed Systems and Networks (POLICY), November 1999, Bristol, United Kingdom. 1999:15-17.
    [87] A. Dardenne, A. van Lamsweerde and S. Fickas. Goal-Directed Requirements Acquisition [J]. Science of Computer Programming, 1993, 20:3-50.
    [88] R. Darimont. Process Support for Requirements Elaboration [D]. PhD Thesis, UniversitéCatholique de Louvain, Dépt. Ingénierie Informatique, Louvain-la-Neuve, Belgium, 1995.
    [89] R. Darimont, E. Delor, P. Massonet, and A. van Lamsweerde. GRAIL/KAOS: An Environment for Goal-Driven Requirements Engineering[C]. Proc. ICSE’98 - 20th Intl. Conf. on Software Engineering, Kyoto, April 1998, vol.2:58-62.
    [90] A.K. Bandara, E.C. Lupu, J. Moffett, A. Russo; A Goal-based Approach to Policy Refinement[C]. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), IBM T J Watson Res Lab, Yorktown Heights, NY, USA:ACM Press, 2004:3-7.
    [91] Bandara, A. K., Lupu, E. C. and Russo, A.. Using Event Calculus to Formalize Policy Specification and Analysis[C]. In Proc. of the 4th IEEE Workshop on Policies for Distributed Systems and Networks, (Policy 2003), 2003:1-14.
    [92] C. Efstratiou, A. Friday, N. Davies, and K. Cheverst. Utilising the Event Calculus for Policy Driven Adaptation on Mobile Systems[C]. In Proceedings of Third Int. Workshop on Policies for Distributed Systems and Networks (POLICY-2002), Monterey, CA, USA, IEEE Press, June 2002.
    [93] Bandara et al.. Policy Refinement for IP Differentiated Services Quality of Service Management [J]. IEEE eTransactions on Network and Service Management, TNSM 3(2):2-13.
    [94] Charalambides, M., Flegkas, P., Pavlou, G., Bandara, A., Lupu, et al. Policy Conflict Analysis for Quality of Service Management[C]. In Proc. of the Sixth IEEE International Workshop on Policies for Distributed Systems and Networks, 2005:99-108.
    [95] Charalambides, M., Flegkas, P., Pavlou, G., Rubio-Loyola, J., Bandara, A., Lupu, et al. Dynamic Policy Analysis and Conflict Resolution for DiffServ Quality of Service Management[C]. In Proc. of the 10th IEEE/IFIP Network Operations and Management Symposium, NOMS. 2006:294-304.
    [96] Abedin, M., Nessa, S., Khan, L. and Thuraisingham, B. Detection and Resolution of Anomalies in Firewall Policy Rules[C]. In Proc. of the 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, 2006:15-29.
    [97] Javier Rubio-Loyola, J., Serrat, J., Charalambides, M., Flegkas, P., Pavlou, G. and Lafuente, A. Using Linear Temporal Model Checking for Goal-oriented Policy Refinement Frameworks[C]. In Proc. of the Sixth IEEE International Workshop on Policies for Distributed Systems and Networks. 2005:181-190.
    [98] Javier Rubio-Loyola, J., Serrat, J., Charalambides, M., Flegkas, P. and Pavlou, G. A Functional Solution for Goal-oriented Policy Refinement[C]. In Proc. of the Seventh IEEE International Workshop on Policies for Distributed Systems and Networks. 2006:133-144.
    [99] Javier Rubio-Loyola, J., Serrat, J., Charalambides, M., Flegkas, P. and Pavlou, G. A Methodological Approach towards the Refinement Problem in Policy-based Management Systems [J]. IEEE Communications Magazine. 2006. 44(10):60-68.
    [100] Jo?o Porto de Albuquerque, H. Isenberg, H. Krumm, P. L. de Geus, Improving the Configuration Management of Large Network Security Systems[C]. In the 16th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2005, Vol. 3775 of Lecture Notes in Computer Science, Springer-Verlag, Berlin Heidelberg, Germany, 2005, 36–47.
    [101] Javier Rubio Loyola. A Methodological Approach to Policy Refinement in Policy-based Management Systems [D]. PhD thesis. Universitat Politècnica de Catalunya. April 2007.
    [102] Danciu, V., Kempter, B. From Processes to Policies Concepts for Large Scale Policy Generation[C]. IEEE/IFIP Network Operations and Management Symposium (NOMS). Seoul, Korea. April, 2004.
    [103] Ingo Lück, S. V?gel, and H. Krumm. Model-based configuration of VPNs[C]. In R. Stadtler and M. Ulema, editors, Proc. 8th IEEE/IFIP Network Operations and Management Symposium NOMS 2002, Florence, Italy, IEEE. 2002:589–602.
    [104] Ingo Lück, C. Sch?fer, and H. Krumm. Model-based Tool Assistance for Packet-filter Design[C]. InProc. IEEE Workshop Policy 2001: Policies for Distributed Systems and Networks, number 1995 in Lecture Notes in Computer Science, Heidelberg. Springer Verlag. 2001:120-136.
    [105] Ingo Lück, C. Sch?fer, and H. Krumm. Model-based tool-assistance for packet-filter design[C]. In E. Lupu M. Sloman, J. Lobo, editor, Proc. IEEE Workshop Policy 2001: Policies for Distributed Systems and Networks, number 1995 in Lecture Notes in Computer Science, Heidelberg, Springer Verlag, 2001:120-136.
    [106] Jo?o Porto de Albuquerque. Scalable Model-based Policy Refinement and Validation for Network Security Systems[R], Tech. Rep. IC-06-005, Institute of Computing, University of Campinas. March 2006.
    [107] Jo?o Porto de Albuquerque, Heiko Krumm, and Paulo Lício de Geus. On scalability and modularisation in the modelling of security systems [J]. In Sabrina De Capitanidi Vimercati, Paul F. Syverson, and Dieter Gollmann, editors, Computer Security -ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings, volume 3679 of Lecture Notes in Computer Science, Berlin Heidelberg, Germany. Springer-Verlag. 2005:287–304.
    [108] M. Beigi, S. Calo and D. Verma. Policy Transformation Techniques in Policy-based Systems Management[C]. IEEE International Workshop on Policies for Distributed Systems and Networks, Yorktown, NY, June 2004:13-22.
    [109] Cridlig, V., State, R. and Festor, O. A Model for Checking Consistency in Access Control Policies for Network Management[C]. In Proc. of the 10th IFIP/IEEE International Symposium on Integrated Network Management, (IM 2007), 2007:11-19.
    [110] Moffett, J. and Sloman, M.. Policy Conflict Analysis in Distributed System Management [J]. Journal of Organizational Computing. 1994, 4(1):1-22.
    [111] Dunlop, N., Indulska, J. and Raymond, K. Dynamic Policy Model for Large Evolving Enterprises[C]. In Proc. of the Fifth IEEE International Enterprise Distributed Object Computing Conference. 2001:193-197.
    [112] Dunlop, N., Indulska, J. and Raymond, K. Dynamic Conflict Detection in Policy Based Management Systems[C]. In Proc. of the Sixth IEEE International Enterprise Distributed Object Computing Conference. 2002:15-26.
    [113] Dunlop, N., Indulska, J. and Raymond, K. Methods for Conflict Resolution in Policy-based Management Systems[C]. In Proc. of the Seventh IEEE International Enterprise Distributed Object Computing Conference. 2003:98-109.
    [114] Jonathan D. Moffett. Specification of Management Policies and Discretionary Access Control[C], Morris Sloman. Network and Distributed Systems Management. Boston: Addison Wesley, 1994.455-480.
    [115] Al-Shaer, E. and Hamed, H. Discovery of Policy Anomalies in Distributed Firewalls[C]. In Proc. of the23rd Conf. IEEE Communications Soc. 2004:2605-2616.
    [116] Al-Shaer, E. and Hamed, H. Modeling and Management of Firewall Policies[C]. IEEE Transactions on Network and Service Management. 2004,1(1):2-10.
    [117] Al-Shaer, E. S., Hamed, H. H.. Taxonomy of Conflicts in Network Security Policies [J]. In IEEE Communications Magazine. 2006, 44(3):134-141.
    [118] Agrawal, D., Giles, J., Lee, K.-W. and Lobo, J. Policy Ratification[C]. In Proc. Of the Sixth IEEE International Workshop on Policies for Distributed Systems and Networks. 2005:223-232.
    [119] Jajodia, S., Samarati, P., Sapino, M. and Subrahmanian, V. Flexible Support for Multiple Access Control Policies [J]. ACM Transactions on Database Systems. 2001, 26(2):214-260.
    [120] Wijesekera, D. and Jajodia, S. A Propositional Policy Algebra for Access Control [J]. ACM Transactions on Information and System Security. 2003, 6(2):286-325.
    [121] Hari, A., Suri, S. and Parulkar, G. Detecting and Resolving Packet Filter Conflicts[C]. In Proc of the 19th Annual Joint Conference of the IEEE Computer and Communications Societies. 2000:1203-1212.
    [122] Al-Shaer, E., Hamed, H., Boutaba, R. and Hasan, M. Conflict Classification and Analysis of Distributed Firewall Policies [J]. IEEE Journal on Selected Areas in Communications, JSAC. 2005, 23(10):2069-2084.
    [123] Zhang, C. C., Winslett, M. and Gunter, C. A. On the Safety and Efficiency of Firewall Policy Deployment[C]. In Proc. IEEE Symposium on Security and Privacy. 2007:33-50.
    [124] Bandara et al. Using Argumentation Logic for Firewall Policy Specification and Analysis[C]. In Proc. of the 17th IFIP/IEEE Distributed Systems: Operations and Management. 2006:185-196.
    [125] Kent et al. Security Architecture for the Internet Protocol[R]. 1998, RFC 2401.
    [126] Fu, Z., Wu, S., Huang, H., Loh, K., Gong, F., Baldine, I. and Xu, C. IPSec/VPN Security Policy: Correctness, Conflict Detection and Resolution[C]. In Proc. of the IEEE International Workshop on Policies for Distributed Systems and Networks. 2001:39-56.
    [127] Yang, Y., Martel, C. and Wu, S. On Building the Minimum Number of Tunnels: an Ordered-split Approach to Manage IPSec/VPN Policies[C]. In Proc. of the IEEE/IFIP Network Operations and Management Symposium. 2004:277-290.
    [128] Yang, Y., Martel, C. U. and Wu, S. F. CLID: A General Approach to Validate Security Policies in A Dynamic Network[C]. In Proc. of the 10th IFIP/IEEE International Symposium on Integrated Network Management. 2007:1-10.
    [129] Lin, C., Xue, C. and Zhitang, L. Analysis And Classification of IPSec Security Policy Conflicts[C]. In Proc. Japan-China Joint Workshop on Frontier of Computer Science and Technology. 2006:83-88.
    [130] Kikuchi, S., Tsuchiya, S., Adachi, M. and Katsuyama, T. Policy Verification and Validation Framework Based on Model Checking Approach[C]. In Proc. of the Fourth International Conference on Autonomic Computing. 2007:1-10.
    [131] Baliosian, J. and Serrat, J. Finite State Transducers for Policy Evaluation and Conflict Resolution[C]. In Proc. of the Fifth IEEE International Workshop on Policies for Distributed Systems and Networks. 2004:250-259.
    [132] Bjorner, D. and Jones, C. The Vienna Development Method: The Meta-Language [M], Springer-Verlag London, UK.
    [133] WU Bei, CHEN Xing-yuan, ZHANG Yong-fui, DAI Xiang-dong, An Extensible Intra Access Control Policy Conflict Detection Algorithm[C]. In 2009 International Conference on Computational Intelligence and Security. Beijing, China, December 2009:483-488.
    [134] Nicodemos Damianou, Naranker Dulay, Emil Lupu, Morris Sloman, The Ponder Policy Specification Language[C]. In Proc. Policy 2001: Workshop on Policies for Distributed Systems and Networks, 2001, 18-39.
    [135]吴蓓,陈性元,张永福,王永亮,代向东.一种可扩展的网络安全设备内策略冲突检测算法[J].计算机应用研究. 2010,4(27):1484-1488.
    [136]张红旗等.信息网络安全[M].清华大学出版社, 2002.
    [137] J. Chomicki, J. Lobo and S. Naqvi, A Logic Programming Approach to Conflict Resolution in Policy Management. Presented at 7th Int. Conf. on Principles of Knowledge Representation and Reasoning (KR2000), Breckenridge, Colorado, USA, 2000:121-132.
    [138]黄俊,韩玲莉. IPSec策略冲突发现形式化技术的研究[J].计算机工程与应用. 2007, 43(6):128-131.
    [139] Hamed, H., Al-Shaer, E. and Marrero, W. (2005), Modeling and Verification of IPSec and VPN Security Policies[C]. In Proc. of the 13th IEEE International Conference on Network Protocols, (ICNP, 2005), 2005:259-278.
    [140] J.G. Alfaro,F.Cuppens, and N.Cuppens-Boulahia, MIRAGE:a tool for the analysis of security policies[EB/OL], http://www.crim-platinum.org/mirage/index.php.
    [141] Alfaro, J. G., Cuppens, F., and Cuppens-Boulahia, N., Analysis of policy anomalies on distributed network security setups[C]. In 11th European Symposium On Research In Computer Security (Esorics2006), volume 4189 of Springer LNCS, 2006:496–511.
    [142]严蔚敏,吴伟民.数据结构(C语言版)[M],清华大学出版社, 1997.
    [143]林琪译. C++图算法[M].北京:机械工业出版社, 2003.
    [144]刘夫云,祁国宁,车宏安.复杂网络中简单路径搜索算法及其应用研究[J].系统工程理论与实践, 2006年4月第4期.
    [145]易汉文.由合理路径推求区间出行阻抗[J].系统工程, 1995, 13(4):61-64.
    [146]李志纯,黄海军.随机交通分配中有效路径的确定方法[J].交通运输系统工程与信息, 2003,3(1):28-32.
    [147] Oskar Andreasson, Iptables指南1.1.19 [EB/OL],http://www.man.ChinaUnix.net, 2006.
    [148]国刚,周峰,孙更新. UML与Rational Rose 2003软件工程统一建模原理与实践教程[M].电子工业出版社, 2007.04.
    [149]王永亮.网络安全设备策略冲突检测与消解技术研究[D].信息工程大学电子技术学院硕士论文, 2008.
    [150] Ashish Bansal. Jumpstart your Yacc...and Lex tool [EB/OL]. http://www-128.ibm.com/developerworks/ library/l-lex.html. 2009.11.22.
    [151] Thomas Niemann. Lex和Yacc简明教程[EB/OL]. http://blog.linuxeden.com/ index.php?op=ViewAlbum&albumId=301&blogId=24559. 2009.11.22.
    [152]汪靖,林植,李云山.一种安全策略的冲突检测与消解方法[J].计算机应用, 2009, 29(3):823-829.
    [153]梅芳等.移动网络资源管理策略的动态冲突消解机制[J].吉林大学学报, 2009, 39(2):430-435.
    [154]李鑫,李凡,刘启和.利用基数约束规则编程消解ECA策略冲突[J].计算机应用研究, 2009, 26(7):2543-2546.
    [155]郎风华.基于人工智能理论的网络安全管理关键技术的研究[D].北京邮电大学博士论文, 2008.
    [156]王震,袁兆山.基于本体的数据集成冲突消解[J].合肥工业大学学报(自然科学版), 2010, 33(3):358-362.
    [157]王柏昀.面向多主体的政策描述规范及冲突研究[D].湖南大学硕士论文, 2009.
    [158] Yow Tzu Lim, Pau-Chen Cheng, Pankaj Rohatgi, John A. Clark. Dynamic Security Policy Learning [J]. In the 1st ACM Workshop on Information Security Governance, ACM CCS 2009, Hyatt Regency Chicago, USA, 2009.
    [159] Yow Tzu Lim,Pau-Chen Cheng,Pankaj Rohatgi, Policy evolution with Genetic Programming: A comparison of three approaches [J]. In 2008 IEEE World Congress on Computational Intelligence, Hong Kong, 2008.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700