Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Synthesis Method of Access Control Policy Based on Binary Sequence Set

An access control strategy and binary sequence technology, applied in electrical components, transmission systems, etc., can solve the problems of redundant system scale, limited synthesis operation performance, and large size, so as to reduce the system scale, eliminate evaluation order dependencies, and improve practicality. The effect of the application foreground

Active Publication Date: 2016-01-13
SHANGHAI JIAO TONG UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, although this method solves the conversion cost of logical algebraic symbols, due to the dependence of the strategy tree's own data structure on the Boolean attribute constraints, it will cause redundancy in the merging process and the problem of a large system scale, which also limits this method. Composite Computational Performance of Methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Synthesis Method of Access Control Policy Based on Binary Sequence Set
  • A Synthesis Method of Access Control Policy Based on Binary Sequence Set
  • A Synthesis Method of Access Control Policy Based on Binary Sequence Set

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be described in detail below in conjunction with specific embodiments. The following examples will help those skilled in the art to further understand the present invention, but do not limit the present invention in any form. It should be noted that those skilled in the art can make several modifications and improvements without departing from the concept of the present invention. These all belong to the protection scope of the present invention.

[0026] The present invention proposes a synthesis method of access control policies based on binary sequence sets. For a better understanding of the present invention, relevant definitions are given first.

[0027] Definition 1: Binary sequence

[0028] A binary sequence BinaryString (abbreviated as BS) is of the form x 0 x 1 ...x n-1 A string representing the disjunctive Boolean expression x 0 ∧x 1 ∧...∧x n-1 , that is, BS≡(x 0 x 1 ...x n-1 ), where each x i The value of (i=0,1,...,n-1)...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an access control policy synthesis method based on a BSset (binary string set). The method comprises the following steps of: firstly, defining elements of the BSset and a set operation rule based on a BS, performing attribute decomposition on an actual policy from an attribute restraint layer according to the definition, and separating the elements in the set to correctly express the policy with a logic expression based on the BS; then, performing semantic check and displacement fusion to eliminate the problems of rule redundancy and semantic conflicts; defining a logic synthesis operator based on the BSset according to actual security demands on the basis, and converting a synthesis mode into a logic expression; directly computing a synthesis result of a policy space based on binary modeling according to the logic expression through the characteristic of being directly taken as a data structure of the BS, wherein the synthesis result is taken as a policy algebra realization mechanism needing no logic conversion; and finally, translating the synthetic policy based on the BSset into an attribute policy.

Description

technical field [0001] The invention relates to a method for inter-domain authorized security interoperability in a distributed system, in particular, an access control strategy synthesis method based on a binary sequence set (Bsset). Background technique [0002] With the rapid development of large-scale distributed network applications, the cooperation between autonomous domains will become more and more frequent. Among them, inter-domain access control strategy synthesis is a key security element for aggregated resource access in distributed technology. Attribute-based access control can solve fine-grained access control in complex systems, and provides an ideal access control scheme for open distributed environments. And using discrete algebra, complex attribute-based policy synthesis methods can be expressed in a rigorous algebraic system. Algebra-based inter-domain access control policy synthesis methods specifically refer to a class that first analyzes and defines po...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 潘理刘晨燕訾小超
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products