A Method for Mapping Internet Security Control Policy Rules
A technology of security control and mapping method, applied in the field of network security, can solve the problems of free description of business rules, difficult to expand, and many business rules, achieve simple and effective management methods, and achieve the effect of expansion and reuse
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0035] The present invention will be further described in detail below in conjunction with the accompanying drawings.
[0036] The invention discloses a method for mapping security control policy rules for internetwork interconnection. The security control policy discussed can be regarded as a business rule applied in the security field, and the security rule is the target rule corresponding to the security control policy. Define the security control policy through Backusian Form, lexical analysis, syntax analysis, semantic analysis and security rule paradigm matching to complete the conversion of security control policy to XML form of security rules, and finally use the security rule generator to generate an executable that matches the target service A command or code for a security rule.
[0037] The present invention adopts a layered architecture design, and divides the mapping process into three layers: a presentation layer, a mapping matching layer, and a rule generation ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


