Computer Science ›› 2015, Vol. 42 ›› Issue (8): 166-169.

Previous Articles     Next Articles

Static Security Policy Consistency Detection Based on Semantic Similarity

TANG Cheng-hua, WANG Li-na, QIANG Bao-hua, TANG Shen-sheng and ZHANG Xin   

  • Online:2018-11-14 Published:2018-11-14

Abstract: The security policy semanteme is the expression of human control safety behavior will.Aiming at the problem of the policy semantic conflicts existing in the definition and conversion process,a static security policy consistency detection algorithm based on the semantic similarity was proposed.Firstly,the domain ontology of the security policy is established,the characteristic factor is extracted,and then the calculation method of semantic similarity based on the ontology concept features is presented.Secondly,the firewall security policy is used as an example to establish a detection model,and the static security policy consistency detection algorithm is used to mark the confict policy,ensuring the consistency of the final policy rule base.Experimental results show that this method has better detection effect,and provides a feasible way to solve the security policy conflicts in the stage of definition,making and mapping.

Key words: Security policy,Semantic similarity,Semantic consistency,Domain ontology,Characteristic factor

[1] David B,Vincent J,Felix K,et al.Enforceable security policies revisited [J].ACM Transactions on Information and System Security,2013,16(1):31-56
[2] Mohan A,Blough D M,Kurc T,et al.Detection of conflicts and inconsistencies in taxonomy-based authorization policies [C]∥Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine.Atlanta,GA,2011:590-594
[3] Li Zang,Chu Chao-hsien,Yao Wen.A semantic authorizationmodel for pervasive healthcare [J].Journal of Network and Computer Applications,2014,38:76-87
[4] 李瑞轩,鲁剑锋,李添翼,等.一种访问控制策略非一致性冲突消解方法[J].计算机学报,2013,36(6):1210-1223 Li Rui-xuan,Lu Jian-feng,Li Tian-yi,et al.An approach for resolving inconsistency conflicts in access control policies [J].Chinese Journal of Computers,2013,36(6):1210-1223
[5] Bao Yi-bao,Yin Li-hua,Fang Bin-xing,et al.A novel logic-based automatic approach to constructing compliant security policies [J].Science China:Information Sciences,2012,55(1):149-164
[6] 包义保,殷利华,方滨兴,等.基于良基语义的安全策略表达与验证方法[J].软件学报,2012,23(4):912-927Bao Yi-bao,Yin Li-hua,Fang Bin-xing,et al.Approach of secu-rity policy expression and verification based on well-founded semantic [J].Journal of Software,2012,23(4):912-927
[7] Basile C,Cappadonia A,Lioy A.Network-level access control policy analysis and transformation [J].IEEE/ACM Transactions on Networking,2012,20(4):985-998
[8] 沈国华,张伟,黄志球,等.基于描述逻辑的特征语义建模及验证[J].计算机研究与发展,2013,50(7):1501-1512Shen Guo-hua,Zhang Wei,Huang Zhi-qiu,et al.Description- logic-based feature modeling and verification [J].Journal of Computer Research and Development,2013,50(7):1501-1512
[9] 王腾,朱青,王珊.基于语义相似度的Web信息可信分析[J].计算机学报,2013,36(8):1668-1681 Wang Teng,Zhu Qing,Wang Shan.Fact statements verification based on semantic similarity [J].Chinese Journal of Computers,2013,36(8):1668-1681
[10] 程勇,黄河,邱莉榕,等.一个基于相似度计算的动态多维概念映射算法[J].小型微型计算机系统,2006,27(6):975-979 Cheng Yong,Huang He,Qiu Li-rong,et al.Similarity-based dynamic multi-dimension concept mapping algorithm [J].Mini-Micro Systems,2006,27(6):975-979
[11] 郑晓洁,张琳.本体映射中相似度计算的改进[J].计算机科学,2013,40(12):108-112 Zheng Xiao-jie,Zhang Lin.Modification of similarity computation in ontology mapping [J].Computer Science,2013,40(12):108-112
[12] Kobra E,Amin R D,Mahmoud N.Overlapped ontology partitioning based on semantic similarity measures [C]∥Proceedings of the 5th International Symposium on Telecommunications.Tehran,Iran,2010:1013-1018
[13] Pirro G.A semantic similarity metric combining features and intrinsic information content [J].Data & Knowledge Engineering,2009,68(11):1289-1308
[14] Kunal V,Rama A,Richard G.Semantic matching of web service policies[C]∥Proceedings of the 2nd International Workshop on Semantic and Dynamic Web Processes.Orlando,USA,2005:1-12
[15] Gruber T R.A translation approach to portable ontology specifications [J].Knowledge Acquisition,1993,5(2):199-220
[16] 倪俊,陈晓苏,刘辉宇,等.网络安全策略求精一致性检测和冲突消解机制的研究[J].计算机科学,2011,38(2):32-37 Ni Jun,Chen Xiao-su,Liu Hui-yu,et al.Research on network security policy refinement consistency of detection and conflict resolution mechanisms [J].Computer Science,2011,38(2):32-37

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!