Semantic Description and Verification of Security Policy Based on Ontology

被引:1
作者
TANG Chenghua [1 ]
WANG Lina [1 ]
TANG Shensheng [2 ]
QIANG Baohua [1 ,3 ]
TIAN Jilong [1 ]
机构
[1] Guangxi Experiment Center of Information Science, Guilin University of Electronic Technology
[2] Department of Engineering Technology, Missouri Western State University
[3] Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology
基金
中国国家自然科学基金;
关键词
security policy; ontology; semantic description of policy; the first-order predicate description logic;
D O I
暂无
中图分类号
TP391.1 [文字信息处理]; TP393.08 [];
学科分类号
081203 ; 0835 ; 0839 ; 1402 ;
摘要
To solve the shortage problem of the semantic description scope and verification capability existed in the security policy,a semantic description method for the security policy based on ontology is presented.By defining the basic elements of the security policy,the relationship model between the ontology and the concept of security policy based on the Web ontology language(OWL)is established,so as to construct the semantic description framework of the security policy.Through modeling and reasoning in the Protégé,the ontology model of authorization policy is proposed,and the first-order predicate description logic is introduced to the analysis and verification of the model.Results show that the ontology-based semantic description of security policy has better flexibility and practicality.
引用
收藏
页码:385 / 392
页数:8
相关论文
共 6 条
  • [1] 逻辑之间的语义忠实语义满翻译
    申宇铭
    马越
    曹存根
    眭跃飞
    王驹
    [J]. 软件学报, 2013, 24 (07) : 1626 - 1637
  • [2] 动态安全策略逻辑语言及安全属性验证问题的研究
    包义保
    殷丽华
    方滨兴
    郭莉
    [J]. 计算机研究与发展, 2013, 50 (05) : 932 - 941
  • [3] 一种基于多本体体系的语义Web服务访问控制方法
    胡罗凯
    陈旭
    柴新
    应时
    [J]. 计算机科学, 2012, 39 (12) : 107 - 113
  • [4] 基于描述逻辑的扩展预测模型标记语言EPMML
    朱小栋
    肖芳雄
    黄志球
    沈国华
    靳玲
    [J]. 计算机学报, 2012, 35 (08) : 1644 - 1654
  • [5] 普适计算环境中防护策略的信任决策机制研究
    魏志强
    周炜
    任相军
    魏青
    贾东宁
    康密军
    殷波
    丛艳平
    [J]. 计算机学报, 2012, 35 (05) : 871 - 882
  • [6] 计算机网络防御策略描述语言研究
    夏春和
    魏玉娣
    李肖坚
    王海泉
    何巍
    [J]. 计算机研究与发展, 2009, 46 (01) : 89 - 99