期刊文献+

基于多层次优化技术的XACML策略评估引擎 被引量:18

XACML Policy Evaluation Engine Based on Multi-Level Optimization Technology
在线阅读 下载PDF
导出
摘要 给出一种采用多层次优化技术的XACML(extensible access control markup language)策略评估引擎实现方案MLOBEE(multi-level optimization based evaluation engine).策略判定评估前,对原始策略库实施规则精化,缩减策略规模并调整规则顺序;判定评估过程中,在引擎内部采用多种缓存机制,分别建立判定结果缓存、属性缓存和策略缓存,有效降低判定引擎和其他功能部件的通信损耗.通过两阶段索引实现的策略缓存,可显著降低匹配运算量并提高策略匹配准确率.仿真实验验证了MLOBEE所采用的多层次优化技术的有效性,其整体评估性能明显优于大多数同类系统. This paper proposes an implementation scheme of XACML (extensible access control markup language) policy evaluation engine based on multi-level optimization technology, MLOBEE (multi-level optimization based evaluation engine). Before evaluating these policies, the scenario implements rule refinement to lessen scale policies and adjust the sequence at the rule. During evaluation, the engine adopts a multi-cache mechanism that includes result cache, attribute cache, and policy cache to reduce the communication cost between engine and other components. To decrease matching magnitudes and enhance matching exactitudes, policy cache practices two stage index techniques. Finally, emulation tests validate that the overall evaluation performance of MLOBEE, using multi-level optimization technology, is better than most other similar systems.
出处 《软件学报》 EI CSCD 北大核心 2011年第2期323-338,共16页 Journal of Software
基金 国家自然科学基金(61003228 60803129) 中国科学院知识创新工程项目(YYYJ-1013) 下一代互联网业务试商用及设备产业化专项(CNGI-09-03-03)
关键词 XACML 访问控制 策略评估 规则精化 缓存机制 策略索引 XACML (extensible access control markup language) access control policy evaluation rule refining cache mechanism policy index
  • 相关文献

参考文献4

二级参考文献55

  • 1龙勤,刘鹏,潘爱民.基于角色的扩展可管理访问控制模型研究与实现[J].计算机研究与发展,2005,42(5):868-876. 被引量:26
  • 2叶春晓,吴中福,符云清,钟将,冯永.基于属性的扩展委托模型[J].计算机研究与发展,2006,43(6):1050-1057. 被引量:17
  • 3李晓峰,冯登国,何永忠.XACML Admin中的策略预处理研究[J].计算机研究与发展,2007,44(5):729-736. 被引量:5
  • 4Sloman M. Policy driven management for distributed systems. Journal of Network and Systems Management, 1994, 2(4) :333-360.
  • 5Moses T. eXtensible access control markup language (XACML) version 2.0. OASIS Standard, 2005.
  • 6Jajodia S, Samarati P, Subrahmanian V S et al. A unified framework for enforcing multiple access control policies// Proceedings of the ACM SIGMOD International Conference on Management of Data. Tucson, Arizona, USA, 1997, 26 (2) : 474-485.
  • 7Jajodia S, Samarati P, Subrahmanian V S. A logical language for expressing authorizations//Proeeedings of the 1997 IEEE Symposium on Security and Privacy. Los Alamitos, California, USA, 1997:31-42.
  • 8Lupu E, Sloman M. Conflicts in policy-based distributed systems management. IEEE Transactions on Software Engineering, 1999, 25(6): 852-869.
  • 9Cholvy L, Cuppens F. Analyzing consistency of security policies//Proceedings of the 1997 IEEE Symposium on Security and Privacy. Los Alamitos, California, USA, 1997:103-112.
  • 10Dunlop N, Indulska J, Raymond K. Dynamic conflict detection in policy-based management systems//Proceedings of the 6th International Enterprise Distributed Object ComputingConference (EDOC). Lausanne, Switzerland, 2002:15-26.

共引文献51

同被引文献130

  • 1徐震,李斓,冯登国.基于角色的受限委托模型[J].软件学报,2005,16(5):970-978. 被引量:52
  • 2罗万伯,罗霄岚,陈炜,李征,魏雁平.多域环境的安全策略管理框架研究[J].四川大学学报(工程科学版),2006,38(2):114-117. 被引量:7
  • 3钟勇,秦小麟,郑吉平,林冬梅.一种灵活的使用控制授权语言框架研究[J].计算机学报,2006,29(8):1408-1418. 被引量:15
  • 4赵黎,徐晶,程文青.一种EPCIS权限管理机制的设计[J].计算机应用研究,2007,24(1):177-179. 被引量:2
  • 5Sloman M S. Policy Driven Management for Distributed Systems [J]. Journal of Network and Systems Management, 1994,2(4): 333-360.
  • 6Woo T Y C, Lain S S. Authorizations in distributed systems: A new approach[J]. Journal of Computer Security, 1993, 2(2/3) : 107-136.
  • 7Sushil J, Samarati P. Flexible support for multiple access control Policies[J]. ACM Transactions on Database Systems, 2001,26 (2): 214-260.
  • 8Sushil J, Samarati P, Los Alamitos, et al. A unified framework for enforcing multiple access control policies[C] // Proceedings of the 1997 ACM SIGMOD international conference on Management of Data. New York, USA, 1997 : 474-485.
  • 9Sushit J, Samarati P, Subrahmanian V. A Logical Language for Expressing Authorizations[C]//Proceedings of IEEE Symposium on Security and Privacy. Oakland, Calif, USA, 1997 : 94-107.
  • 10Lobo J, Bhatia R, Naqvi S. A Policy Description Language[C]//Proceedings of the Sixteenth National Conference on Artificial Intelligence Eleventh Innovative Applications of AI Conference. Orlando, Florida, USA, 1999.

引证文献18

二级引证文献41

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部