期刊文献+

电信IT安全保障能力评价模型与基线达标体系研究 被引量:5

Research of Telecom IT Security Capabilities and Baseline Compliance Assessment Model System
下载PDF
导出
摘要 首先分析了电信运营商内部业务运营支撑系统亟需解决的安全问题,围绕建立健全IT安全保障体系建设目标,设计了基于能力成熟度的安全能力评价模型,并给出了模型实现的安全基线达标体系标准实践的具体标准和方案。 This paper analyzes the telecom operators within the business operation support system needed to solve current security issues surrounding the establishment of a sound IT security system objectives, design based on the capability maturity model for evaluation of security capabilities, and gives the model to achieve security baseline system standard practice standard specific standards and programs.
出处 《电信科学》 北大核心 2012年第4期67-71,共5页 Telecommunications Science
基金 国家发展和改革委员会重大信息安全专项基金资助项目
关键词 CTG-MBOSS 保障体系 成熟度模型 安全基线 CTG-MBOSS, security system, maturity model, security baseline
  • 相关文献

参考文献11

二级参考文献53

  • 1王娜,方滨兴,罗建中,刘勇.“5432战略”:国家信息安全保障体系框架研究[J].通信学报,2004,25(7):1-9. 被引量:36
  • 2张新跃,邓炜春,沈树群.策略驱动的网络安全管理模型[J].计算机应用研究,2005,22(1):226-228. 被引量:12
  • 3冯登国.国内外信息安全研究现状及发展趋势(摘编)[J].信息网络安全,2007(1):9-11. 被引量:11
  • 4IEEE STD 1472 -1995. IEEE Standard Glossary of Software Engineering Terminology[ S]. Piscataway, NJ: Institute of Electrical and Electronics Engineers, Inc,1995.
  • 5Bell David E, La Padula Leonard J. Secure Computer Systems : A Mathematical Model [ R ]. ESD - TR - 73 - 278,1973.
  • 6Biba K J. Integrity Considerations for Secure Computer Systems[ R]. ESD - TR - 76 - 372,1977.
  • 7Information Processing Systems -OSI RM. ISO/TC97 7498 -2. Part 2: Security Architecture[ S]. Geneva: International Organization for Standardization, 1989.
  • 8This Version April. DoD Technical Architecture Framework for Information Management, Volume 6 : DoD Goal Security Architecture, Defense Information Systems Agency Center for Standards [ EB/OL]. ( 1996 - 4 - 30) [ 2009 - 12 - 22 ]. http ://www. dmff. org/pres/index. html.
  • 9Fine T, Minear S E, Hills Arden. Assuring Distributed Trusted Mach [ C ]//Proceeding of the 1993 Symposium on Security and Privacy. Washinton DC : IEEE Computer Society, 1993:206 - 218.
  • 10Spencer Ray, Smalley Stephen, Loscocco Peter, et al. The Flask Security Architecture : System Support for Diverse Security Policies[ C]//Proceedings of the 8th USENIX Security Symposium. Berkeley, CA:USENTX Association, 1999:123 -139.

共引文献60

同被引文献19

引证文献5

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部