Chenghua Tang

Learn More
—More and more Internet services and applications are transferred by the HTTP protocol due to its openness. This brings new challenges to the security management of network boundary. In this paper, a new approach is proposed to detect the pseudo Web behavior which abuses the general HTTP protocol to pass through the network boundary. A new parameter is(More)
Using high-level security policy rules to regulate low-level system, the security management system with a high level of expansibility and flexibility was made. For purpose of managing network security policy duly and flexibly in the complex network environment, and resolving its issue efficiency, a dynamic and self-adaptive security policy realization(More)
Security policy is the core of information system security management. In order to solve the problem of the security policy unified specification description, the classification and normative description are proposed based on the relationship between its object classes, which reflect the network information system and engineering security products and(More)
For purpose of managing network security policy duly and flexibly in the complex network environment, and resolving its issue efficiency, this paper proposes network security policy self-adaptive management and distribution model. An incident triggered, policy-driven and self-adaptive management mechanism is established, and the impact of safety equipment(More)
In this paper, an energy-based interference signal detection framework is proposed for the analysis of spectrum utilization in the ISM band cognitive Radio Sensor Networks (CRSNs). A hypothesis testing is used to derive the exact solution and approximate solution (with less computational complexity) of the quality of detection (i.e., detection probability(More)
To solve the shortage problem of the semantic description scope and verification capability existed in the security policy, a semantic description method for the security policy based on ontology is presented. By defining the basic elements of the security policy, the relationship model between the ontology and the concept of security policy based on the(More)