期刊文献+

网络保护质量研究 被引量:8

Research on Quality of Protection in Networks
下载PDF
导出
摘要 随着人们的网络安全意识不断增强,迫切需要一套可度量、可量化的指标来评价系统安全保护的质量.作为网络安全领域的一个新概念,网络保护质量(Quality of Protection,QoP)能为不同的用户和业务提供不同等级的安全保证,满足日益复杂网络环境下的安全需求,在国内外受到广泛关注.文章综述了不同应用背景下QoP的含义,提出了QoP的定义及其评价指标,分析了目前QoP的体系结构、评价模型及实现机制,并对今后的研究方向进行了展望. Computer Network security is more and more important, it is urgent to develop a suite of measurable and quantitative metrics to evaluate quality of security protection. As a new concept in the field of network security, QoP (Quality of Protection) can provide different levels security assurance for different users and traffic and meet the requirement of security in increasingly complicated network environments, and is focused at home and aboard. In this paper, all kinds of meaning of QoP in the literature are discussed, in refer to the concepts of QoS, the definition of QoP and metrics are developed and analyzed from the user and system view. Then the state of art of QoP evaluation modeling, architectures and implementing mechanism are analyzed and classified. Finally some concluding remarks on new and challenging directions for future and potential research of QoP are discussed.
出处 《计算机学报》 EI CSCD 北大核心 2008年第10期1667-1678,共12页 Chinese Journal of Computers
基金 国家"九七三"重点基础研究发展规划项目基金(2006CB708301) 教育部科技创新培育重点项目基金(707005 60218003) 国家自然科学基金(90718040 60673187 60872055 60803123) 微软清华联合实验室基金 诺基亚研究生科研创新基金资助~~
关键词 保护质量 安全 评价指标 评价模型 服务质量 quality of protection security evaluation metrics evaluation modeling quality of service
  • 相关文献

参考文献50

  • 1Linn J. Generic security service application program interface. IETF Request for Comments: 1509, September, 1993
  • 2Stankovie J A, M Supri M, Ramamritham K, Buttazo G C. Deadline Scheduling for Real-Time Systems. Norwell MA: Kluwer Academic Publishers, 1998:13-22
  • 3Moses T. Web Services Security Quality of Protection, OASIS Discussion Forum for Web Services Security Quality of Protection, September, 2002
  • 4Blakley B. CORBA Security: An Introduction to Safe Computing with Objects Addison. Boston, USA: Wesley, 2000
  • 5Gerstel O, Sasaki G. Quality of protection(QoP) : A quantitative unifying paradigm to protection service grades//Proceedings of the OptiComm2001, SPIE, 2001, 4599:12-23
  • 6Grover W, Clouqueur M. Span-restorable mesh network design to support multiple quality of protection (QoP) service classes//Proceedings of the International Conference on Optical Communications and Networks (ICOCN'02). Singapore, 2002:305-308
  • 7Grover W, Clouqueur M. Span-restorable mesh networks with multiple quality of protection (QoP) service classes. Photonic Network Communications, 2005, 9(1): 19-34
  • 8Lin Yu, Hamza H S, Deogun J S. Path-based protection in WDM network with differentiated quality-of-protection// Proceedings of the IEEE International Conference on Communieations(ICC'06). Istanbul, Turkey, 2006, 6: 2489- 2494
  • 9Ming C, Luying Z, Gurusamy M. Dynamic routing of de pendable connections with different QoP grades in WDM optical networks//Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC'2005). La Manga del Mar Menor, Cartagena, Spain, 2005:532-537
  • 10Xue G, Chen L, Thulasiraman K. Quality of service and quality of protection issues in preplanned recovery schemes using redundant trees. IEEE Journal on Selected Areas in Communications, Optical Communications and Networking Series, 2003, 21(8): 1332-1345

二级参考文献55

  • 1林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 2Qu G.,Jayaprakash,Ramkishore M.,Hariri S.,Raghavendra C.S.A framework for network vulnerability analysis.In:Proceedings of the 1st IASTED International Conference on Communications,Internet,Information Technology (CⅡT2002),St.Thomas,Virgin Islands,USA,2002,289~298
  • 3Moore A.P.,Ellison R.J.,Linger R.C.Attack modeling for information security and survivability.Carnegie Mellon Univer sity:Technical Note CMV/SEI-2001-TH-001,2001
  • 4Jonsson E.,Olovsson T.A quantitative model of the security intrusion process based on attacker behavior.IEEE Transactions on Software Engineering,1997,23(4):235~245
  • 5Mahimkar A.,Shmatikov V.Game-based analysis of Denial-of-service prevention protocols.In:Proceedings of the IEEE Computer Security Foundations Workshop(CSFW05),Aix-en-Provence,France,2005,287~301
  • 6Xia Zheng-You,Zhang Shi-Yong.A kind of network security behavior model based on game theory.In:Proceedings of the 4th International Conference on Parallel and Distributed Computing,Applications and Technologies,PDCAT,Chengdu,China,2003,950~954
  • 7Avizenis A.,Laprie J.,Randell B.Fundamental concepts of dependability.In:Proceedings of the 3rd Information Survivability Workshop,Boston,MA,2000,7~12
  • 8Goseva-Postojanova K.,Wang F.,Wang R.,Gong F.,Vaidyanathan K.,Trivedi K.S.,Muthusamy B.Characterizing intrusion tolerant systems using a state transition model.In:Proceedings of DARPA DISCEX Ⅱ Conference,2001,Ⅱ(2):211~221
  • 9Schneier B.Secrets and Lies:Digital Security in a Networked World.New York:John Wiley & Sons,2000
  • 10Dacier M.Towards quantitative evaluation of computer secur ity[Ph.D.dissertation].Institut National Polytechnique de Toulouse,France,1994

共引文献91

同被引文献58

  • 1唐莞菁,汪卫,王智慧,周皓峰,施伯乐.一种多级安全数据模型中的多实例语义[J].计算机研究与发展,2007,44(z3):238-243. 被引量:3
  • 2万绪江.职工教育管理系统[J].气象与环境学报,1992,18(4):42-43. 被引量:1
  • 3张伟哲,方滨兴,胡铭曾,张宏莉.基于信任QoS增强的网格服务调度算法[J].计算机学报,2006,29(7):1157-1166. 被引量:51
  • 4WANG Wei,ZENG GuoSun.Trusted dynamic level scheduling based on Bayes trust model[J].Science in China(Series F),2007,50(3):456-469. 被引量:14
  • 5胡文启,徐军,张伍荣.网管实战宝典[M].清华大学出版社,2008:132-171.
  • 6Samit S, Rakesh G, Hasan P. Survivable network design: The state of the art. Information Systems Frontiers, 1999, 1(3): 303-315.
  • 7Manish G, Smith J C. Models and algorithms for the design of survivable multi-commodity flow networks with general failure scenarios. Omega, 2008, 36(6): 1057-1071.
  • 8Jitamitra D, Suvrajeet S. A global optimization algorithm for reliable network design. European Journal of Operational Research. 2010. 200(1),1-8.
  • 9杨文国.高质量分层结构电信网络综合优化设计研究.博士后出站报告,中国科学院科技政策与管理科学研究所,北京,2008.
  • 10Mitsuo G, Anup K, Iong R K. Recent network design techniques using evolutionary algorithms. International Journal of Production Economics, 2005, 98(2): 251-261.

引证文献8

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部