Telecommunications Science ›› 2015, Vol. 31 ›› Issue (1): 171-175.doi: 10.11959/j.issn.1000-0801.2015020

• Wide operating technology • Previous Articles     Next Articles

Automatic Verification Analysis Technology of Network Security Domain

Xiaofeng Liu,Bin Tan,Lan Qiu,Huanru Wang   

  1. Information Security Management Center, China Mobile Group Guangxi Co., Ltd., Nanning 530022, China
  • Online:2015-01-15 Published:2017-02-21

Abstract:

By studying the automatic verification analysis techniques of network security domain, a secure domain topology automatically restore and security domains devices interconnected relations, security domain boundaries and border access control policy automatic verification were achieved. Through automation, normalization and processes curing methods, violations of the security domain provisions of the act were detected. It ensures border access control policy is minimized and network security domain is divided continued compliance, reduces the risks associated with the security domain management.

Key words: security domain, compliance, access control policy

No Suggested Reading articles found!