Dissertation > Excellent graduate degree dissertation topics show

Research on Checking and Digesting Policy Conflicts Under Multi-Policy Environments

Author: LiTianYi
Tutor: LiRuiXuan
School: Huazhong University of Science and Technology
Course: Applied Computer Technology
Keywords: Access Control Policy conflicts Non-uniform conflict Collision detection Conflict Resolution
CLC: TP393.08
Type: Master's thesis
Year: 2011
Downloads: 10
Quote: 0
Read: Download Dissertation


Access control technology to protect the security of the system , through the development of some kind of control strategy and its main purpose is to protect system resources from unauthorized users to access or unauthorized access by legitimate users . Multiple access control policies , however , probably because of the different needs of different access authorization results . These inconsistencies will lead to policy conflicts . If a system policy conflict will lead to policy failure because of conflict . When the presence of a large number of policy conflict , it will cost a lot of system resources , and even cause the system to crash . Most studies on policy conflict at home and abroad are use policy description language , complete the appropriate conflict detection and resolution by way of logical deduction . These studies are often only a single access control policy conflict model . The strategy of conflict under the combined effect of a variety of access control model is relatively scant . In response to these issues , the proposed policy conflict detection and a multi- strategy support digestion model directed graph model , the policy conflict detection problem into subject and object domain to figure seeking node connectivity node , and then the strategy portfolio complete policy conflict digestion . For non- conformance of access control system security policy and the effectiveness of strategies coexist conflict , a priority-based conflict digestion . The digestion methods quickly and efficiently to ensure that when the strategy of a relatively small number of complete non - conformance conflicts digestion process . Finally , based on a combination of these theoretical studies to achieve policy analysis module of the the tag library system of secure access to multi-strategy , the completion of the Detection and Resolution Algorithm .

Related Dissertations

  1. Study on Channel Allocation of Multi-Channel MAC Protocol in Ad-Hoc Network,TN929.5
  2. The Design and Implementation of DICOM Middle Software and Access Control Model in Formation Integration Platform,TP311.13
  3. Research and Implementation of the Conflict Resolution in Process Modeling of Magic Platform,TP311.5
  4. Study on Model-Based Visualization of Rice Roots,S511
  5. Research on MAC Protocol for WIreless Sensor Network,TN915.04
  6. Key Technologies of Modeling and Simulation in Virtual Surgery,TP391.41
  7. Study on the Access Control of the Court Information System,TP309
  8. The Design and Implementation of Higher People’s Court Website That Based on Component and ASP Technology,TP311.52
  9. Design and implementation of civil explosive industry online procurement system,TP311.52
  10. Research and Design of Virtual Research Center System of Yalong River Based on S2SH,TP311.52
  11. Fujian Telecom operation and maintenance operations audit system design and implementation,TP311.52
  12. Research on Purpose-based Access Control in Relational Database,TP311.13
  13. Research and Implementation of Embeded Web System Security,TP393.08
  14. Design and Implementation of Network Access Control System Based on Portal Protocol,TP393.08
  15. Decision Support System of Vehicle Scheduling in Double Level Garage,TP242
  16. Design and Realization of Distributed RFID Access Control System,TP273.5
  17. Research and Implementation on Smartcard Database Management System,TP311.52
  18. Design and Implement of Frequency EOC System and Research of Its Security Mechanism,TN915.02
  19. Identity-Based Authentication System Research and Implementation,TN918.1
  20. Converged IP and FC storage system security architecture design and implementation,TP333

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile