{"title":"复合信息系统的安全策略优化问题","authors":"S. Belim, S. Belim","doi":"10.1109/FarEastCon50210.2020.9271465","DOIUrl":null,"url":null,"abstract":"The problem of optimizing the security policy for the composite information system is formulated. Subject-object model for information system is used. Combining different types of security policies is formalized. The target function for the optimization task is recorded. The optimization problem for combining two discretionary security policies is solved. The case of combining two mandatory security policies is studied. The main problems of optimization the composite security policy are formulated. +50 CHMBOJIOB!!!","PeriodicalId":280181,"journal":{"name":"2020 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The Security Policies Optimization Problem for Composite Information Systems\",\"authors\":\"S. Belim, S. Belim\",\"doi\":\"10.1109/FarEastCon50210.2020.9271465\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The problem of optimizing the security policy for the composite information system is formulated. Subject-object model for information system is used. Combining different types of security policies is formalized. The target function for the optimization task is recorded. The optimization problem for combining two discretionary security policies is solved. The case of combining two mandatory security policies is studied. The main problems of optimization the composite security policy are formulated. +50 CHMBOJIOB!!!\",\"PeriodicalId\":280181,\"journal\":{\"name\":\"2020 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon)\",\"volume\":\"69 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-10-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/FarEastCon50210.2020.9271465\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FarEastCon50210.2020.9271465","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Security Policies Optimization Problem for Composite Information Systems
The problem of optimizing the security policy for the composite information system is formulated. Subject-object model for information system is used. Combining different types of security policies is formalized. The target function for the optimization task is recorded. The optimization problem for combining two discretionary security policies is solved. The case of combining two mandatory security policies is studied. The main problems of optimization the composite security policy are formulated. +50 CHMBOJIOB!!!