期刊文献+

一种信息系统安全测度的框架 被引量:9

A measurement framework of information system security
原文传递
导出
摘要 本文尝试从安全测度角度来统一解释目前通行的用于评价信息系统安全性的安全评估,风险分析,安全技术评估准则,安全审计等方法,分析它们各自的特点及应用范围,并提出一种信息系统安全测度的框架。
出处 《信息安全与通信保密》 2002年第1期26-28,共3页 Information Security and Communications Privacy
  • 相关文献

参考文献11

  • 1[1]Control Objectives for Information and Related Technology (COBIT) 3rd Edition,Information Systems Audit and Control Foundation, July 2000.
  • 2[2]IT Baselines Protection Manual published by Bundesamt f ür.Sicherheit in der Informationstechnik (BSI)
  • 3[3]A Code of Practice for Information Security (ISO/17799: 2000)
  • 4[4]General Accounting Office, Federal Information System Control Audit Manual (FISCAM). GOA/AIMD-12.19.6,January 1999.
  • 5[5]SSE-CMM(r) (model). System Security Engineering Capability Maturity Model. Model Description, Version 2.0. April 1999.
  • 6[6]Capability Maturity Mode forSoftware. Version 1.1 February 1993
  • 7[7]Trusted Computer System Evaluation Criteria US National Computer Security Center. 1985. NCSC 5200.28-STD.
  • 8[8]Information Technology Security Evaluation Criteria Provisional Harmonized Criteria of France. Germany. Netherlands.and United Kingdom. Commission of theEuropean Communities. 1991
  • 9[9]Communications Security Establishment. Canada. Canadian Trusted Computer Product Evaluation Criteria Version 3.0e. January 993
  • 10[10]Common Criteria for Information Technology Security Evaluation (CC). Version 2.1 .August 1999.

同被引文献47

  • 1黄文培.客票网上预订系统设计与研究[J].微电子学与计算机,2004,21(7):21-25. 被引量:7
  • 2孙宏伟,邹涛,田新广,张尔扬.基于机器学习的入侵检测方法实验与分析[J].计算机工程与设计,2004,25(5):694-696. 被引量:8
  • 3黄文培.开放式智能安全代理体系架构设计[J].中国铁道科学,2005,26(4):98-103. 被引量:3
  • 4牛旭明,李智勇,桂坚勇,耿振国.信息安全风险评估中的关键技术[J].信息安全与通信保密,2007,29(4):17-20. 被引量:9
  • 5[2][美]Terry Ogletree.UPGRADING ANDREPAIRING NETWORKS[M].北京:电子工业出版社,2001
  • 6The International Organization for Standardization.Common Cri- teria for Information Technology Security Evaluation-Part 2: Security Fmction Reauirements[S].ISO/IEC 15408-2:1999(E),1999.
  • 7Hammond J L, O' Reily P J P. Performance Analysis of Local Computer Networks [ M]. Addison-Wesley Publishing Company, 1986. 255- 312.
  • 8Kleinrock L. Performance Evaluation/Analysis of Computer Networks [J]. Proc. IEEE, 1993, (1): 1179-1191.
  • 9逮昭义 王思明.计算机通信网信息量理论[M].北京:电子工业出版社,1997..
  • 10Harris B, Hunt R. TCP/IP security threats and attack methods[J]. Computer Communications,1999,22(10):885-897.

引证文献9

二级引证文献71

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部