Computer Science ›› 2014, Vol. 41 ›› Issue (6): 104-107.doi: 10.11896/j.issn.1002-137X.2014.06.021

Previous Articles     Next Articles

Algorithm of Matching to XACML-Policy Based on Component of Multi-valued Attribute

LI Dong-hui,ZHANG Bin,FEI Xiao-fei and LIU Yang   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Aiming at the demand of matching between the XACML policy and request based on the multi-valued attri-bute,this paper analyzed the corresponding attribute relationships between policy rule and the request.Three related theorems were proposed and proved based on the relationship between attributes implication and permissions implication.According to the three policy matching theorems,a matching algorithm was put forward.Finally,several experiments show that the algorithm enhances the matching efficiency.

Key words: XACML,Policy,Multi-valued attribute,Matching theorem,Matching algorithm

[1] OASIS.Extensible Access Control Markup Language (XAC-ML) V3.0[EB/OL].http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-cd-1-en.pdf.April,2009
[2] 李晓峰,冯登国,何永忠.XACML Admin中的策略预处理研究[J].计算机研究与发展,2007,4(5):730-736
[3] Bertolino A,Daoudagh S,Lonetti F.Automatic XACML re-quests generation for policy Testing[C]∥2012IEEE Fifth International Conference on Software Testing,Verification and Validation,2012,185:842-849
[4] Liu A X,Fei Chen.Designing Fast and Scalable XACML Policy Evaluation Engines[J].IEEE Transactions on Computers,2011,2(60):1802-1816
[5] Butler B,Jennings B,Botvich D.An experimental testbed topredict the performance of XACML Policy Decision Points [C]∥12th IFIP/IEEE International Symposium on Integrated Network Management.2011:353-360
[6] Marouf S,Shehab M.Statistics and Clustering Based Framework for Efficient XACML Policy Evaluation [C]∥IEEE International Symposium on Policy for Distributed Systems and Networks.2009,36:118-125
[7] 谢辉.基于UCON改进模型的授权管理关键技术研究[D].郑州:解放军信息工程大学,2009:53-58
[8] 陈伟鹏,王娜娜.基于XACML的策略评估优化技术的研究[J].计算机应用研究,2013,0(3):900-905
[9] Jajodia S,Samarati P,Subrahmanian V S.A logical language for expressing authorizations [C]∥Proceedings of the 1997IEEE Symposium on Security and Privacy.Los Alamitos,California,USA,1997:31-42
[10] 王雅哲,冯登国.一种XACML规则冲突及冗余分析方法[J].计算机学报,2009,2(3):516-527
[11] Sun Microsystems Inc.Sun XACML Policy Engine.http://sunxacml.sourceforge.net/guide.html

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!