Automatic Verification Analysis Technology of Network Security Domain
By studying the automatic verification analysis techniques of network security domain, a secure domain topology automatically restore and security domains devices interconnected relations, security domain boundaries and border access control policy automatic verification were achieved. Through autom...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Beijing Xintong Media Co., Ltd
2015-01-01
|
| Series: | Dianxin kexue |
| Subjects: | |
| Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2015020/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1841529518701936640 |
|---|---|
| author | Xiaofeng Liu Bin Tan Lan Qiu Huanru Wang |
| author_facet | Xiaofeng Liu Bin Tan Lan Qiu Huanru Wang |
| author_sort | Xiaofeng Liu |
| collection | DOAJ |
| description | By studying the automatic verification analysis techniques of network security domain, a secure domain topology automatically restore and security domains devices interconnected relations, security domain boundaries and border access control policy automatic verification were achieved. Through automation, normalization and processes curing methods, violations of the security domain provisions of the act were detected. It ensures border access control policy is minimized and network security domain is divided continued compliance, reduces the risks associated with the security domain management. |
| format | Article |
| id | doaj-art-52ffa4b2a51345db825d0d283599b272 |
| institution | Kabale University |
| issn | 1000-0801 |
| language | zho |
| publishDate | 2015-01-01 |
| publisher | Beijing Xintong Media Co., Ltd |
| record_format | Article |
| series | Dianxin kexue |
| spelling | doaj-art-52ffa4b2a51345db825d0d283599b2722025-01-15T03:17:46ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012015-01-013117117559616689Automatic Verification Analysis Technology of Network Security DomainXiaofeng LiuBin TanLan QiuHuanru WangBy studying the automatic verification analysis techniques of network security domain, a secure domain topology automatically restore and security domains devices interconnected relations, security domain boundaries and border access control policy automatic verification were achieved. Through automation, normalization and processes curing methods, violations of the security domain provisions of the act were detected. It ensures border access control policy is minimized and network security domain is divided continued compliance, reduces the risks associated with the security domain management.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2015020/security domaincomplianceaccess control policy |
| spellingShingle | Xiaofeng Liu Bin Tan Lan Qiu Huanru Wang Automatic Verification Analysis Technology of Network Security Domain Dianxin kexue security domain compliance access control policy |
| title | Automatic Verification Analysis Technology of Network Security Domain |
| title_full | Automatic Verification Analysis Technology of Network Security Domain |
| title_fullStr | Automatic Verification Analysis Technology of Network Security Domain |
| title_full_unstemmed | Automatic Verification Analysis Technology of Network Security Domain |
| title_short | Automatic Verification Analysis Technology of Network Security Domain |
| title_sort | automatic verification analysis technology of network security domain |
| topic | security domain compliance access control policy |
| url | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2015020/ |
| work_keys_str_mv | AT xiaofengliu automaticverificationanalysistechnologyofnetworksecuritydomain AT bintan automaticverificationanalysistechnologyofnetworksecuritydomain AT lanqiu automaticverificationanalysistechnologyofnetworksecuritydomain AT huanruwang automaticverificationanalysistechnologyofnetworksecuritydomain |