【24h】

Semantic Context Aware Security Policy Deployment

机译:语义上下文感知安全策略部署

获取原文
获取原文并翻译 | 示例

摘要

The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the security devices. The complexity of the security requirements is additionally increased when contextual constraints are taken into account. Such situations appear when addressing the dynamism of some security requirements or when searching a finer granularity for the security rules. The context denotes those specific conditions in which the security requirements are to be met. (Re)deploying a contextual security policy depends on the security device functionalities: either (1) the devices include all functionalities necessary to deal with a context and the policy is consequently deployed for ensuring its automatic changes or (2) the devices do not have the right functionalities to entirely interpret a contextual requirement. We present a solution to cope with this issue: the (re)deployment of access control policies in a system that lacks the necessary functionalities to deal with contexts.
机译:安全策略的成功部署不仅与安全要求的复杂性密切相关,而且与安全设备的功能/功能密切相关。当考虑到上下文约束时,安全性要求的复杂性进一步增加。解决某些安全要求的动态性或在为安全规则搜索更精细的粒度时,会出现这种情况。上下文表示要满足安全性要求的那些特定条件。 (重新)部署上下文安全策略取决于安全设备的功能:(1)设备包括处理上下文所需的所有功能,因此部署了该策略以确保其自动更改,或者(2)设备没有正确解释功能的正确功能。我们提出一种解决此问题的解决方案:在缺乏处理上下文的必要功能的系统中(重新)部署访问控制策略。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号