计算机应用 ›› 2014, Vol. 34 ›› Issue (2): 421-427.

• 计算机安全 • 上一篇    下一篇

分布式应用访问控制策略精化冲突分析

吴迎红,黄皓,周靖康,曾庆凯   

  1. 计算机软件新技术国家重点实验室(南京大学),南京 210023
  • 收稿日期:2013-08-13 修回日期:2013-10-01 出版日期:2014-02-01 发布日期:2014-03-01
  • 通讯作者: 黄皓
  • 作者简介:吴迎红(1966-),女,江苏南京人,高级工程师,博士研究生,主要研究方向:信息安全;黄皓(1957-),男,江苏南京人,教授,博士,主要研究方向:信息安全;周靖康(1988-),男,江苏无锡人,硕士研究生,主要研究方向:信息安全;曾庆凯(1963-),男,安徽滁州人,教授,博士,主要研究方向:信息安全。
  • 基金资助:
    国家863计划项目

Conflict analysis of distributed application access control policies refinement

WU YinghongWU,HUANG Hao,ZHOU Jingkang,ZENG Qingkai   

  1. State Key Laboratory for Novel Software Technology (Nanjing University), Nanjing Jiangsu 210023, China
  • Received:2013-08-13 Revised:2013-10-01 Online:2014-02-01 Published:2014-03-01
  • Contact: HUANG Hao

摘要: 随着云技术的发展,分布式应用平台朝着弹性资源和环境动态变迁的方向发展。分布式应用访问控制策略精化计算与资源和环境相关,也需要较强的性能与这种动态性相适应。现有的访问控制策略空间冲突分析方法虽然可以用于分布式访问控制策略精化中的策略冲突分析,但是该类算法以权限赋值单元为单位计算,计算粒度过细导致性能较低。提出了基于集合求交递推算法,以权限赋值单元集合为单位计算策略冲突来提高计算粒度。理论分析与实验结果表明该算法具有较高性能, 适用于云平台策略精化计算的高性能的需求。

关键词: 访问控制, 分布式, 策略精化, 策略冲突分析

Abstract: With the growth of cloud technology, distributed application platform develops towards elasticity resources and dynamic migration environment. The refinement of distributed application access control policies was associated with resources and environment, which also needs to improve performance to adapt to the dynamics. Although present access control space policies conflict analysis methods could be used in the conflict analysis of distributed application access control policies refinement. The granularity of its calculating unit is too fine to make batter performance. In this article, the authors designed a conflict analysis algorithm used in distributed application access control policies refinement, the conflict analysis algorithm was based on recursive calculation the intersection of sets and the calculation unit of the algorithm was permission assignment unit which improved computing granularity. The experimental results and analysis show that the proposed algorithm has better performance, and fits the needs of improving computing performance of cloud platform access control policies refinement.

Key words: access control, distributed, policy refinement, policy conflict analysis

中图分类号: