期刊文献+

移动环境下Flask框架的改进 被引量:1

Improvement of flask architecture in mobile environment
下载PDF
导出
摘要 在移动环境下,节点之间在进行通信时要进行策略的动态协调,而作为典型的动态安全系统框架-Flask,只能用于静态环境中。在研究了Flask框架体系结构的基础上,对其进行改进,使其适合于动态的移动环境。通过在Flask框架结构中加入翻译器组件,并在网络环境中引入协调器(可信第三方)组件,在协调器中将安全策略分为提供策略和授权策略分别进行协调,解决了在移动环境下移动节点间进行通信时的策略动态协调问题。 In mobile environment, the nodes need policy dynamical reconciliation when they communicate with each other, but as a typical dynamic secure operating system Flask is used only in static environment and can not reconcile policy dynamically among the nodes. An improvement of the Flask architecture on the basis of the Flask architecture makes it adapt to mobile environment. A translator and a reconciliation module (trusted third party) in which secure policy reconciliation is divided into provisioning reconciliation and authorization reconciliation are added into the network environment, which solve the problem of dynamic policy reconciliation when nodes communicate with each other in mobile environment.
作者 程瑶 吴振强
出处 《计算机工程与设计》 CSCD 北大核心 2009年第4期880-882,896,共4页 Computer Engineering and Design
基金 国家自然科学基金重点项目(60633020)
关键词 安全操作系统 移动环境 Flask框架 可信第三方 策略协调 secure operation system distributed environment flask architecture trusted third party policy reconciliation
  • 相关文献

参考文献10

  • 1陈冬松,潘成胜,俞承志,王光兴.一种基于策略的配置管理思想[J].火力与指挥控制,2003,28(5):74-76. 被引量:3
  • 2李莉,任秀丽,栾贵兴.基于策略的分布式网络管理系统[J].东北大学学报(自然科学版),2002,23(6):515-518. 被引量:20
  • 3刘婷婷,张友良,汪惠芬.安全策略的一致性维护研究[J].计算机工程与应用,2004,40(31):21-24. 被引量:5
  • 4Hao Wang,Somesh Jha,Miron Livny.Security policy reconciliation in distributed computing environment[C].New York:IEEE Computer Society Press, 137-146.
  • 5Cataldo Basile,Antonio Lioy.Towards an algebraic approach to solve policy conficts[R].Turku,Finland,2004.
  • 6Mike Hibler, David Andersen, Jay Lepreau. The flask security architecture: system support for diverse security policies [EB/ OL].http://www.es.utah.edu/flux/flask/.
  • 7蔡勉,金怡.信息安全模型研究及安全操作系统设计[J].计算机系统应用,2006,15(10):6-10. 被引量:2
  • 8Patrick Mcdaniel,Atul Prakash.Methods and limitations of security policy reconciliation[J].ACM Transactions on Information and System Security,2006,9(3):259-291.
  • 9Andrea Maurino, Stefano Modafferi,Barbara Pemici.Reflective architectures for adaptive information systems[C].Milano, Italy: Dipartimento di Elettronica e Informazione,Piazza Leonardo da Vinci,2003.
  • 10罗万伯,罗霄岚,陈炜,李征,魏雁平.多域环境的安全策略管理框架研究[J].四川大学学报(工程科学版),2006,38(2):114-117. 被引量:7

二级参考文献28

  • 1陈炜,罗霄峰,罗万伯.一种用于信息安全的信息保障模型[J].四川大学学报(工程科学版),2004,36(4):103-106. 被引量:5
  • 2刘益和,刘嘉勇.一个基于角色的信息流模型及应用[J].四川大学学报(工程科学版),2004,36(5):94-97. 被引量:5
  • 3袁春阳,梁洪亮.高可信安全操作系统的开发及核心技术[J].信息网络安全,2005(3):47-49. 被引量:2
  • 4Martin J P. A survey of distributed enterprise network and systems management[J]. Journal of Network and Systems Management,1999,7(1):9-26.
  • 5Martin J P, Znaty S. Annotated typology of distributed network management paradigms[R]. Lausanne:SCC Press,1997.
  • 6IS9595-2-1988,Common Management Information Service[S].
  • 7Galvin J M, McCloghrie K. Administrative model for version 2 of the simple network management protocol(SNMPv2)[R]. Reston: Internet Engineering Task Force,1993.
  • 8Jamie J,Michael J. Draft-ietf-ipsec-policy-schema-00.txt[EB/OL],http:∥www.ietf.org/proceedings/99jul/I-D/draft-ietf-ipsec-policy-schema-00.txt, 1999-05-24/1999-11-24.
  • 9Jamie J, Michael J. Policy framework [EB/OL]. http:∥www.ietf.org/html.charters/policy-charter.html,1999-01-10/2000-10-04.
  • 10Ncklisch J. A rule language for network policies[EB/OL]. http:∥www-dse.doc.ic.ac.uk/events/policy-99/pdf/26-Nicklisch.pdf, 1998-09-10/1999-10-10.

共引文献30

同被引文献2

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部