Database security
An active temporal model for network management databases
Proceedings of the fourth international symposium on Integrated network management IV
A declarative approach to business rules in contracts: courteous logic programs in XML
Proceedings of the 1st ACM conference on Electronic commerce
Consensus system for solving conflicts in distributed systems
Information Sciences—Informatics and Computer Science: An International Journal
A Mechanism for Establishing Policies for Electronic Commerce
ICDCS '98 Proceedings of the The 18th International Conference on Distributed Computing Systems
Administrative scope in the graph-based framework
Proceedings of the ninth ACM symposium on Access control models and technologies
Graph-theoretic method for merging security system specifications
Information Sciences: an International Journal
Efficient Policy Conflict Analysis for Autonomic Network Management
EASE '08 Proceedings of the Fifth IEEE Workshop on Engineering of Autonomic and Autonomous Systems
Security Policy Integration Method for Information Systems
ACIIDS '09 Proceedings of the 2009 First Asian Conference on Intelligent Information and Database Systems
Hi-index | 0.00 |
Policy-based security is an effective approach to manage knowledge systems by handling all behaviors of a system thought a set of rules. This approach has such advantages as capacity to define general high-level targets, ease for configuration, and flexibility in development and maintenance. However, the resolution of conflicts is unavoidable requirement because of many elements of subjectivity as well as objectivity in administrative processes. To this end, several works have been done, and they gave concrete results. In this paper, we will propose a new approach to solve conflicts and to integrate rules in a policy. A new representation of rules is given, the distances between rules are defined as well as postulates are presented and analyzed. Algorithms for integrating policy also have been proposed and examined.