Computer Science ›› 2018, Vol. 45 ›› Issue (9): 224-229.doi: 10.11896/j.issn.1002-137X.2018.09.037
• Software & Database Technology • Previous Articles Next Articles
HAN Dao-jun1,2, YUAN Wan-li2, DUAN Xiao-yu2, ZHANG Lei2
CLC Number:
[1]WANG Y Z,FENG D G.A Conflict and Redundancy Analysis Method for XACML Rules [J].Chinese Journal of Computers,2009,32(3):516-530.(in Chinese) 王雅哲,冯登国.一种XACML规则冲突及冗余分析方法[J].计算机学报,2009,32(3):516-530. [2]NIU D H,MA J F,MA Z,et al.HPEngine:high performance XACML policy evaluation engine based on statistical analysis[J].Journal on Communications,2014,35(8):206-215.(in Chinese) 牛德华,马建峰,马卓,等.基于统计分析优化的高性能XACML策略评估引擎[J].通信学报,2014,35(8):206-215. [3]WANG Y Z,FENG D G,ZHANG L W,et al.XACML policy evaluation engine based on multi-level optimization technology [J].Journal of Software,2011,22(2):323-338.(in Chinese) 王雅哲,冯登国,张立武,等.基于多层次优化技术的XACML策略评估引擎[J].软件学报,2011,22(2):323-338. [4]QI Y,CHEN J,LI Q M.XACML policy evaluation optimization method based on reordering [J].Journal of Nanjing University of Science and Technology,2015,39(2):187-193.(in Chinese) 戚湧,陈俊,李千目.一种基于重排序的XACML策略评估优化方法[J].南京理工大学学报,2015,39(2):187-193. [5]CHEN J.The research on XACML strategy optimization method [D].Nanjing:Nanjing University of Science and Technology,2015.(in Chinese) 陈俊.XACML策略优化方法研究[D].南京:南京理工大学,2015. [6]CHEN W H,WANG N N.Research on XACML policy evaluation optimization technology [J].Application Research of Computer,2013,30(3):900-905.(in Chinese) 陈伟鹤,王娜娜.基于XACML的策略评估优化技术的研究[J].计算机应用研究,2013,30(3):900-905. [7]QI Y,CHEN J,LI Q M,et al.XACML strategy optimization method based on redundancy elimination and attribute numericalization [J].Journal of Computer Science,2016,43(2):163-168.(in Chinese) 戚湧,陈俊,李千目.基于冗余消除和属性数值化的XACML策略优化方法[J].计算机科学,2016,43(2):163-168. [8]eXtensible Access Control Markup Language(XACML) Version 3.0 [EB/OL].http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-os-en.doc. [9]XACML 2.0 conformances tests [EB/OL].http://www.oasis-open.org/committees/download.php/14846/xacml2.0-ct-v.0.4.zip. [10]Sun’s XACML Implementation [EB/OL].http://sunxacml. sourceforge.net. [11]Enterprise XACML Implementation [EB/OL].http://source-forge.net/projects/java-xacml. |
[1] | LI Zhao-qi, LI Ta. Query-by-Example with Acoustic Word Embeddings Using wav2vec Pretraining [J]. Computer Science, 2022, 49(1): 59-64. |
[2] | WU Lin, BAI Lan, SUN Meng-wei, GOU Zheng-wei. Algal Bloom Discrimination Method Using SAR Image Based on Feature Optimization Algorithm [J]. Computer Science, 2021, 48(9): 194-199. |
[3] | DING Shi-ming, WANG Tian-jing, SHEN Hang, BAI Guang-wei. Energy Classifier Based Cooperative Spectrum Sensing Algorithm for Anti-SSDF Attack [J]. Computer Science, 2021, 48(2): 282-288. |
[4] | WANG Meng, DING Zhi-jun. New Device Fingerprint Feature Selection and Model Construction Method [J]. Computer Science, 2020, 47(7): 257-262. |
[5] | WANG Rui-jie, LI Jun-huai, WANG Kan, WANG Huai-jun, SHANG Xun-chao, TU Peng-jia. Feature Selection Method for Behavior Recognition Based on Improved Feature Subset Discrimination [J]. Computer Science, 2020, 47(11A): 204-208. |
[6] | LIU Jun-qi, LI Zhi, ZHANG Xue-yang. Multi-level Ship Target Discrimination Method Based on Entropy and Residual Neural Network [J]. Computer Science, 2020, 47(11A): 253-257. |
[7] | ZENG Jin-song, RAO Yun-bo. Intelligent Classification of Massive Information Based on Conflict Game Algorithm [J]. Computer Science, 2018, 45(8): 208-212. |
[8] | JI Chong, WANG Sheng and LU Jian-feng. Human Action Recognition Based on Fisher Discrimination Dictionary Learning [J]. Computer Science, 2017, 44(7): 270-274. |
[9] | LU Qiu-ru, CHEN Jian-ping, MA Hai-ying and CHEN Wei-xu. Optimization Algorithm for Extensible Access Control Markup Language Policies [J]. Computer Science, 2017, 44(12): 115-119. |
[10] | CAO Wan-tian and YU Peng-fei. Mobile Application Security Policies and Testing Research on XACML [J]. Computer Science, 2017, 44(11): 134-145. |
[11] | LIU Xiao-jian, WANG Li-sheng and LIAO Xin-kao. Multiple Permissions Secure Access Control Scheme Combining CP-ABE and XACML in Cloud Storage [J]. Computer Science, 2016, 43(3): 118-121. |
[12] | QI Yong, CHEN Jun and LI Qian-mu. XACML Policy Optimization Method Based on Redundancy Elimination and Attribute Numericalization [J]. Computer Science, 2016, 43(2): 163-168. |
[13] | NI Chuan, HUANG Zhi-qiu, WANG Shan-shan and HUANG Chuan-lin. Attribute-based Access Control Method Supporting Policies Ontology Reasoning [J]. Computer Science, 2015, 42(3): 96-101. |
[14] | LI Dong-hui,ZHANG Bin,FEI Xiao-fei and LIU Yang. Algorithm of Matching to XACML-Policy Based on Component of Multi-valued Attribute [J]. Computer Science, 2014, 41(6): 104-107. |
[15] | . New Ideas of Face Orientation Discrimination Based on BP Neural Networks [J]. Computer Science, 2012, 39(Z11): 366-368. |
|