《计算机应用研究》|Application Research of Computers

基于匹配策略的安全协议重构分析

Establishment of reconfigurable security protocols based on matching policies

免费全文下载 (已被下载 次)  
获取PDF全文
作者 朱雨雯,张红旗,包义保,杜学绘
机构 解放军信息工程大学 河南省信息安全重点实验室,郑州 450004
统计 摘要被查看 次,已被下载
文章编号 1001-3695(2015)04-1154-03
DOI 10.3969/j.issn.1001-3695.2015.04.046
摘要 可重构安全协议对提高安全系统的灵活性和适应能力具有重要意义,它可根据具体上下文环境进行配置、移植,极大增强了系统的安全性,目前基于软件构件的协议重构方法无法满足安全协议对安全性和计算性的特殊要求。针对安全协议的安全性和高密度计算特性,提出了一种针对现有资源选择重构元的解决方法,给出协议可重构元匹配和基于QoS的重构元质量满意度的协议重构选择算法,使系统可以尽快按照重构协议需求选择满意的可重构元。通过实例说明该方法的执行过程,应用结果表明该方法能够有效提高重构效率和重构准确度。
关键词 可重构安全协议;协议可重构元;匹配策略
基金项目 国家“973”计划资助项目(2011CB311801)
国家“863”计划资助项目(2012AA012704)
河南省科技创新人才计划资助项目(114200510001)
本文URL http://www.arocmag.com/article/01-2015-04-046.html
英文标题 Establishment of reconfigurable security protocols based on matching policies
作者英文名 ZHU Yu-wen, ZHANG Hong-qi, BAO Yi-bao, DU Xue-hui
机构英文名 Henan Provincial Key Laboratory of Information Security, PLA Information Engineering University, Zhengzhou 450004, China
英文摘要 Capable of being configured and ported according to specific contexts, the reconfigurable security protocols can greatly enhance system security, and therefore are of great significance to the flexibility and adaptability of security system. However, up till now, all reconfigurable protocols have been based on software components, thus fail to meet the special requirements of security protocols on security and computability. In consideration of the characteristics of security and high-density, this paper put forward a new solution to find quickly the reconfigurable protocol units according to the existing resources, which could offer the QoS-based algorithm of the suitable reconfigurable protocols and allowed the system to choose the desirable reconfigurable components in accordance to its needs.Through the illustration of the executive process of this new method, the result shows that this algorithm can effectively improve the reconfiguration efficiency and accuracy.
英文关键词 reconfigurable security protocols; protocol reconfigurable unit; matching policy
参考文献 查看稿件参考文献
  [1] ALONISTIOTI N, PATOUNI E, GAZIS V. Generic architecture and mechanisms for protocol reconfiguration[J] . Mobile Networks and Applications, 2006, 11(6):917-934.
[2] NIAMANESH M, SABETGHADAM S, YOUSEFZADEHRAHAGHI R, et al. Design and implementation of a dynamic reconfigurable architecture for protocol stack[C] //Proc of International Symposium on Fundamentals of Software Engineering. 2007:396-403.
[3] CHEN Hui, ZHOU Chun-jie, HUANG Xiong-feng, et al. Management of the reconfigurable protocol stack based on SDL for networked control systems[J] . Information Technology Journal, 2010, 9(5):849-863.
[4] 蔡衍文, 陈天洲, 吴朝晖. 面向通信设备的网络协议构件化[J] . 计算机应用研究, 2004, 21(12):253-256.
[5] 张建辉, 于婧, 汪斌强, 等. 可重构路由协议构件研究[J] . 信息工程大学学报, 2009, 10(1):109-114.
[6] 宋丽华, 张晓彤, 王沁, 等. 嵌入式协议栈可重构性分析与设计实现[J] . 计算机科学, 2007, 34(9):69-76.
[7] CHENG Shang-wen, GARLAN D, SCHMERL B, et al. Using architectural style as a basis for system self-repair[C] //Proc of Working IEEE/IFIP Conference on Software Architecture. 2002:45-59.
[8] ESTRIN G, BUSSELL B, TURN R, et al. Parallel processing in a restructurable computer system[J] . IEEE Trans on Electronic Computers, 1963, 12(5):747-755.
[9] 谢惠敏, 郭东辉. 可重构的串行高级加密标准加解密电路设计[J] . 计算机应用, 2013, 33(2):450-454.
收稿日期 2014/4/9
修回日期 2014/6/1
页码 1154-1156
中图分类号 TP393.08
文献标志码 A