【24h】

REASONING ABOUT SECURE INTEROPERATION USING SOFT CONSTRAINTS

机译:使用软限制对安全互操作的推理

获取原文
获取外文期刊封面目录资料

摘要

The security of a network configuration is based not just on the security of its individual components and their direct interconnections, but also on the potential for systems to interoperate indirectly across network routes. Such interoperation has been shown to provide the potential for circuitous paths across a network that violate security. In this paper we propose a constraint-based framework for representing access control configurations of systems. The secure reconfiguration of a system is depicted as a constraint satisfaction problem.
机译:网络配置的安全性不仅基于其各个组件的安全性及其直接互连,还基于系统跨网络路由间接互操作的可能性。 已经示出了这种互操作性为违反安全性的网络提供了迂回路径的潜力。 在本文中,我们提出了一种基于约束的框架,用于代表系统的访问控制配置。 系统的安全重新配置被描绘为约束满足问题。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号