Strategy conflict processing method and device based on complex network

A conflict resolution and complex network technology, applied in the computer field, can solve problems such as difficult maintenance, restricted access, and failure to consider the factors of the subject and object of the strategy, and achieve the effects of scientific and reasonable selection, automation, and reduced workload

Pending Publication Date: 2022-03-29
BEIJING QIANXIN TECH +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the policy conflict resolution method based on priority has the problem of huge amount of work for formulating and modifying policy priority and difficult maintenance; the policy conflict resolution method based on new loading policy priority does not consider the subject and object factors of the policy; Policy-first policy conflict resolution, restricting access

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Strategy conflict processing method and device based on complex network
  • Strategy conflict processing method and device based on complex network
  • Strategy conflict processing method and device based on complex network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to make the purposes, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments These are some embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0049] Combine below Figure 1-Figure 5 Describe the complex network-based policy conflict processing method of the present invention.

[0050] see figure 1 , figure 1 is a schematic flowchart of the complex network-based policy conflict processing method provided by the present invention, figure 1 The shown complex network-base...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a strategy conflict processing method and device based on a complex network. The method comprises the following steps: in response to a primary access request for a target system, determining at least two access control policies in an access control policy set; if the determined access control policies conflict, determining nodes corresponding to at least two access control policies in the main network, and acquiring importance information corresponding to the determined nodes; determining an executed access control policy from at least two access control policies based on the acquired importance information; wherein nodes in the main body network are main bodies of access control policies in the access control policy set; the importance information of the nodes in the subject network reflects the importance degree of the subject of the access control strategy to the target system through the object of the access control strategy. According to the embodiment of the invention, strategy selection can be carried out scientifically and reasonably when access control strategy conflicts are solved.

Description

technical field [0001] The present invention relates to the field of computer technology, and in particular, to a method and device for handling policy conflict based on a complex network. Background technique [0002] With the development of computer network technology, network security has become an important issue in the development of computer networks. Among the many types of cybersecurity, insider risk accounts for the vast majority. Internal risks are mainly caused by illegal and unauthorized use of the system by legitimate users. At present, the access control mechanism is mainly used to limit user access rights to avoid illegal and unauthorized operations. Common access control models include access control matrix, discretionary access control, mandatory access control, role-based access control, attribute-based access control, etc. All access control models need to configure a large number of access control policies. There is a policy conflict. For example, pol...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/20H04L63/10
Inventor 范石林田礼军张泽洲
Owner BEIJING QIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products