{"title":"信息系统安全策略集成方法","authors":"T. Tran, N. Nguyen","doi":"10.1109/ACIIDS.2009.14","DOIUrl":null,"url":null,"abstract":"Policy-based security is an effective and convenient approach to manage information systems. By this approach, we can handle easily all behaviors of a system thought a set of rules. However, conflicts between rules are one of the most common problems we have to deal with in administrative process. In this paper, we propose a new axiomatic approach to solve this problem. Several postulates are presented and analyzed as well as some algorithms are proposed next. The algorithms also have been implemented and tested, and experimental results are presented.","PeriodicalId":275776,"journal":{"name":"2009 First Asian Conference on Intelligent Information and Database Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Security Policy Integration Method for Information Systems\",\"authors\":\"T. Tran, N. Nguyen\",\"doi\":\"10.1109/ACIIDS.2009.14\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Policy-based security is an effective and convenient approach to manage information systems. By this approach, we can handle easily all behaviors of a system thought a set of rules. However, conflicts between rules are one of the most common problems we have to deal with in administrative process. In this paper, we propose a new axiomatic approach to solve this problem. Several postulates are presented and analyzed as well as some algorithms are proposed next. The algorithms also have been implemented and tested, and experimental results are presented.\",\"PeriodicalId\":275776,\"journal\":{\"name\":\"2009 First Asian Conference on Intelligent Information and Database Systems\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 First Asian Conference on Intelligent Information and Database Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ACIIDS.2009.14\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 First Asian Conference on Intelligent Information and Database Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ACIIDS.2009.14","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security Policy Integration Method for Information Systems
Policy-based security is an effective and convenient approach to manage information systems. By this approach, we can handle easily all behaviors of a system thought a set of rules. However, conflicts between rules are one of the most common problems we have to deal with in administrative process. In this paper, we propose a new axiomatic approach to solve this problem. Several postulates are presented and analyzed as well as some algorithms are proposed next. The algorithms also have been implemented and tested, and experimental results are presented.