Unlock instant, AI-driven research and patent intelligence for your innovation.

Role-based access control (RBAC) security policy analyzing method based on graph plan

A security strategy and analysis method technology, applied in computer security devices, special data processing applications, instruments, etc., can solve the problems of security authority leakage and semantic coverage, and achieve the effect of ensuring security

Inactive Publication Date: 2014-02-05
GUANGDONG UNIV OF TECH
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, even with a security policy set with consistent semantics, there are still places where the semantics cannot be covered, which can easily cause the problem of security permission leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Role-based access control (RBAC) security policy analyzing method based on graph plan
  • Role-based access control (RBAC) security policy analyzing method based on graph plan
  • Role-based access control (RBAC) security policy analyzing method based on graph plan

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0042] figure 1 A flow chart of the RBAC security policy analysis method based on graph planning provided by the present invention is shown. For ease of illustration, only the parts relevant to the present invention are shown.

[0043] A kind of RBAC security policy analysis method based on graph planning provided by the present invention, the method comprises:

[0044] In S101: defining a security authorization policy of the RBAC model;

[0045] In S102: defining a state transition system for a safety analysis problem;

[0046] In S103: converting the security analysis problem into an intelligent planning problem for a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a role-based access control (RBAC) security policy analyzing method based on a graph plan. The method includes defining a security authorization policy of an RBAC model; defining a state conversion system of a security analyzing problem; converting the security analyzing problem into an intelligent planning problem to analyze the problem; designing a security analyzing algorithm based on an intelligent plan for the intelligent planning problem; developing an interactive security policy analyzing tool. According to the method, judgment of common RBAC security policy analyzing problems, authority leakage problems and policy hidden bugs is provided, a method for solving the authority leakage problems and the policy hidden bug judgment problems is provided based on the graph plan method, security authority leakage caused by analyzing of the RBAC model in the security field is avoided, and user information security is ensured.

Description

technical field [0001] The invention belongs to the field of artificial intelligence, and in particular relates to an RBAC security policy analysis method based on graph planning. Background technique [0002] Graph planning is the field of artificial intelligence, the direction of intelligent planning, and it is a basic method applied to solving planning problems. RBAC (Role-based Access control1) is role-based access control. [0003] In large-scale information systems, there are many users, roles, and resources (files, directories, application tools, etc.). When the RBAC model is used for resource access control, a large number of atomic management transactions are far beyond the scope of responsibility of the system security administrator. Therefore, the hierarchical delegation of authorization management is often used to achieve distributed management: establish hierarchical management The upper-level administrators formulate security policies and delegate management ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F17/50
CPCG06F21/577G06F2221/034
Inventor 刘强
Owner GUANGDONG UNIV OF TECH