XACML policy rule checking method
A detection method and rule-based technology, applied in the direction of instruments, digital data authentication, electronic digital data processing, etc., can solve problems such as constraints
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0073] Figure 4 A conflict detection algorithm based on attribute-level operational association is described. The input of the algorithm includes the subject attribute policy pol to be detected and the permission policy list of the upper-level subject attribute that is referenced and inherited by it, and the output is a pair(rule p , rule d ) set conSet composed of. The specific process of the algorithm is as follows. For the permit type rule rule in pol p , determine the rule p Medium resource attribute resAttr p Node on the semantic tree res , to Node res Each policy pol in its own policy identification list Δ to test. Analyze pol one by one Δ The deny type rule in the rule d , if the rule p and rule d The state dependency is then pair(rule p , rule d ) belongs to the (5) type analyzed in the previous section, and it is added to conSet. Call the recursive function Traverse-up-checking(Node res ) handle Node res The negative authority of the upper node im...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com