Automatic Verification Analysis Technology of Network Security Domain

By studying the automatic verification analysis techniques of network security domain, a secure domain topology automatically restore and security domains devices interconnected relations, security domain boundaries and border access control policy automatic verification were achieved. Through autom...

Full description

Saved in:
Bibliographic Details
Main Authors: Xiaofeng Liu, Bin Tan, Lan Qiu, Huanru Wang
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2015-01-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2015020/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529518701936640
author Xiaofeng Liu
Bin Tan
Lan Qiu
Huanru Wang
author_facet Xiaofeng Liu
Bin Tan
Lan Qiu
Huanru Wang
author_sort Xiaofeng Liu
collection DOAJ
description By studying the automatic verification analysis techniques of network security domain, a secure domain topology automatically restore and security domains devices interconnected relations, security domain boundaries and border access control policy automatic verification were achieved. Through automation, normalization and processes curing methods, violations of the security domain provisions of the act were detected. It ensures border access control policy is minimized and network security domain is divided continued compliance, reduces the risks associated with the security domain management.
format Article
id doaj-art-52ffa4b2a51345db825d0d283599b272
institution Kabale University
issn 1000-0801
language zho
publishDate 2015-01-01
publisher Beijing Xintong Media Co., Ltd
record_format Article
series Dianxin kexue
spelling doaj-art-52ffa4b2a51345db825d0d283599b2722025-01-15T03:17:46ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012015-01-013117117559616689Automatic Verification Analysis Technology of Network Security DomainXiaofeng LiuBin TanLan QiuHuanru WangBy studying the automatic verification analysis techniques of network security domain, a secure domain topology automatically restore and security domains devices interconnected relations, security domain boundaries and border access control policy automatic verification were achieved. Through automation, normalization and processes curing methods, violations of the security domain provisions of the act were detected. It ensures border access control policy is minimized and network security domain is divided continued compliance, reduces the risks associated with the security domain management.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2015020/security domaincomplianceaccess control policy
spellingShingle Xiaofeng Liu
Bin Tan
Lan Qiu
Huanru Wang
Automatic Verification Analysis Technology of Network Security Domain
Dianxin kexue
security domain
compliance
access control policy
title Automatic Verification Analysis Technology of Network Security Domain
title_full Automatic Verification Analysis Technology of Network Security Domain
title_fullStr Automatic Verification Analysis Technology of Network Security Domain
title_full_unstemmed Automatic Verification Analysis Technology of Network Security Domain
title_short Automatic Verification Analysis Technology of Network Security Domain
title_sort automatic verification analysis technology of network security domain
topic security domain
compliance
access control policy
url http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2015020/
work_keys_str_mv AT xiaofengliu automaticverificationanalysistechnologyofnetworksecuritydomain
AT bintan automaticverificationanalysistechnologyofnetworksecuritydomain
AT lanqiu automaticverificationanalysistechnologyofnetworksecuritydomain
AT huanruwang automaticverificationanalysistechnologyofnetworksecuritydomain