基于本体的战术SOA动态安全策略An ontology-based tactical SOA dynamic security strategy
邹文通,顾颖彦,程培星
摘要(Abstract):
战术网络中构建面向服务的通信网络,将战术网络中的计算资源、存储资源和网络资源等以服务的形式呈现,实现信息服务在用户、系统之间的广泛共享。战术环境的动态特性和去中心化服务特性为战术SOA的安全机制提出了新的要求。针对战术环境的动态特性和去中心化服务的安全需求,提出一种基于本体的战术SOA动态安全策略,详细描述了该策略的框架、概念和形式化表达。并针对具体的动态语境分析了战术SOA动态安全策略如何应对战术环境的动态特性,同时体现了去中心化操作的能力。
关键词(KeyWords): 战术网;安全策略;SOA;本体结构;描述逻辑;动态特性
基金项目(Foundation): 海装“十三五”预研课题(3020102010501)~~
作者(Author): 邹文通,顾颖彦,程培星
DOI: 10.16652/j.issn.1004-373x.2018.08.038
参考文献(References):
- [1]唐龙,王峰.基于UCDS的战术网络拓扑构建研究[J].通信技术,2015,48(9):1037-1043.TANG Long,WANG Feng.Tactical network topology construction based on UCDS[J].Communication technology,2015,48(9):1037-1043.
- [2]陈强,孙超山.基于SOA技术的战术通信服务控制技术研究[J].通信技术,2014,47(6):642-646.CHEN Qiang,SUN Chaoshan.Application of SOA technology in the tactical communication service control[J].Communication technology,2014(6):642-646.
- [3]曾梦岐,蒲文彬,穆阳,等.战术自组网分层安全框架研究[J].信息安全与通信保密,2012(4):51-55.ZENG Mengqi,PU Wenbin,MU Yang,et al.Cross-layer security framework for tactical mobile Ad hoc network[J].Information security and communications privacy,2012(4):51-55.
- [4]CAMPBELL B,PING I C,LOCKHART H,et al.OASIS security services(SAML)TC[J].IEEE transactions on communications,2009(7):1518-1529.
- [5]CARROLINE D P K R,HANNE R N,FLEMMING N.The logic of XACML[J].Science of computer programming,2014,83(2):80-105.
- [6]段采宇,冉承新,张维明,等.C^4ISR需求开发新途径:基于本体的方法[J].火力与指挥控制,2008,33(8):86-90.DUAN Caiyu,RAN Chengxin,ZHANG Weiming,et al.Study of developing C^4ISR requirements based on ontology[J].Fire control and command control,2008,33(8):86-90.
- [7]张玉连,李帅,周兴林.基于本体的Deep Web自动标注方法研究[J].现代图书情报技术,2009(9):45-50.ZHANG Yulian,LI Shuai,ZHOU Xinglin.Research on ontology-based automatic annotation for Deep Web[J].New technology of library and information service,2009(9):45-50.
- [8]朱雪峰.基于语义的动态服务组合技术研究[D].开封:河南大学,2014.ZHU Xuefeng.The research of automatic dynamic service composition based on semantic technology[D].Kaifeng:Henan University,2014.
- [9]KARANDE H A,GUPTA S S.Ontology based intrusion detection system for web application security[C]//Proceedings of International Conference on Communication Networks.Gwalior:IEEE,2016:228-232.
- [10]BAADER F,CALVANESE D,MCGUINNESS D L,et al.The description logic handbook:theory,implementation,and applications[J].Kybernetes,2010,32(9/10):43-95.