• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Li Xiangjun, Meng Luoming, and Jiao Li. Problems in Results of Policy Conflict Resolutions and Detection and Resolution Methods in Network Management Systems[J]. Journal of Computer Research and Development, 2006, 43(7): 1297-1303.
Citation: Li Xiangjun, Meng Luoming, and Jiao Li. Problems in Results of Policy Conflict Resolutions and Detection and Resolution Methods in Network Management Systems[J]. Journal of Computer Research and Development, 2006, 43(7): 1297-1303.

Problems in Results of Policy Conflict Resolutions and Detection and Resolution Methods in Network Management Systems

More Information
  • Published Date: July 14, 2006
  • Nowadays, various methods are proposed to resolve policy conflicts in network management systems. These methods work only in limited or specific scopes, so multi-policy conflict resolution methods are often combined together to resolve policy conflicts. The processes of different policy conflict resolution methods are isolated, and the results of these methods are also isolated. So the existing results of policy conflict resolution are not taken into account in these processes. So conflicts may exist between the results of these different conflict resolution methods. The possible conflicts between results of different policy conflict resolution methods are analyzed, and detection and resolution methods are proposed to detect and resolve these conflicts. Finally the experiment results and conclusions are presented.
  • Related Articles

    [1]Zhang Huanhuan, An Congkai, Zhao Langcheng, Zhou Anfu, Ma Huadong, Yuan Yi, Cao Ning. Algorithmic Intelligence Right Management Method in Video Cloud-Network Platform[J]. Journal of Computer Research and Development, 2023, 60(4): 828-838. DOI: 10.7544/issn1000-1239.202330023
    [2]Huang Xiaohui, Li Dong, Shi Hailong, Cui Li. EasiRCC: A Method of Rule-Matching and Conflict Resolution for Smart Home[J]. Journal of Computer Research and Development, 2017, 54(12): 2711-2720. DOI: 10.7544/issn1000-1239.2017.20160646
    [3]Luo Jun, Zhao Chuanzhi, Wang Fei. An Efficient Privilege Manage Method Based on RBAC[J]. Journal of Computer Research and Development, 2016, 53(5): 1000-1008. DOI: 10.7544/issn1000-1239.2016.20148288
    [4]Wang Lina, Ren Zhengwei, Dong Yongfeng, Yu Rongwei, Deng Ruyi. A Management Approach to Key-Used Times Based on Trusted Platform Module in Cloud Storage[J]. Journal of Computer Research and Development, 2013, 50(8): 1628-1636.
    [5]Bao Yibao, Yin Lihua, Fang Binxing, Guo Li. Logic-Based Dynamical Security Policy Language and Verification[J]. Journal of Computer Research and Development, 2013, 50(5): 932-941.
    [6]Hu Jun and Li Zhiang. A Policy-Oriented Cooperation Model in Agent Organization[J]. Journal of Computer Research and Development, 2012, 49(7): 1474-1493.
    [7]Ning Zhao, Shi Shengfei, Li Jianzhong, Wang Chaokun. Multi-resolution Data Storage Method for Region Query in Sensor Networks[J]. Journal of Computer Research and Development, 2012, 49(3): 589-597.
    [8]Tang Chenghua, Yu Shunzheng. Verifying Network Security Policy Based on Features[J]. Journal of Computer Research and Development, 2009, 46(11): 1854-1861.
    [9]Hu Ning, Zou Peng, and Zhu Peidong. A Cooperative Mechanism for Inter-Domain Routing Management[J]. Journal of Computer Research and Development, 2009, 46(8): 1251-1259.
    [10]Yao Jian, Mao Bing, and Xie Li. A DAG-Based Security Policy Conflicts Detection Method[J]. Journal of Computer Research and Development, 2005, 42(7): 1108-1114.

Catalog

    Article views (577) PDF downloads (568) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return