Báo cáo hóa học: " On Optimizing Compatible Security Policies in Wireless Networks"

Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: On Optimizing Compatible Security Policies in Wireless Networks | Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking Volume 2006 Article ID 23728 Pages 1-7 DOI WCN 2006 23728 On Optimizing Compatible Security Policies in Wireless Networks Scott . Huang 1 Kia Makki 2 and Niki Pissinou2 1 Computer Science Department City University of Hong Kong 83 Tat Chee Avenue Kowloon Hong Kong 2 Telecommunications and Information Technology Institute Florida International University 10555 WFlagler Street EC 2910 Miami FL 33174 USA Received 29 September 2005 Revised 19 January 2006 Accepted 1 February 2006 This paper deals with finding the maximum number of security policies without conflicts. By doing so we can remove security loophole that causes security violation. We present the problem of maximum compatible security policy and its relationship to the problem of maximum acyclic subgraph which is proved to be NP-hard. Then we present a polynomial-time approximation algorithm and show that our result has approximation ratio 1 1 k for any integer k with complexity O Nk 1 . Copyright 2006 Scott . Huang et al. This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use distribution and reproduction in any medium provided the original work is properly cited. 1. INTRODUCTION Security is the basis of any system and it can be described in general terms such as confidentiality integrity and availability but what we do precisely mean by security for a particular system varies from system to system and possibly depends on the situation. The security policies in the army in a financial institution at a university and in a big corporation are significantly different. Each of which has their own needs that should be reflected in the design of their security infrastructures. In the army every document is classified into different confidential levels. Only authorized persons have the right to view a document. Also certain sensitive tasks can .

Không thể tạo bản xem trước, hãy bấm tải xuống
TÀI LIỆU LIÊN QUAN
TÀI LIỆU MỚI ĐĂNG
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.