期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
XFire和WSS4J下的Web Service组合安全策略 被引量:3
1
作者 邓子云 黄婧 罗涛 《计算机系统应用》 2009年第9期54-56,64,共4页
结合运用XFire和WSS4J,由XFire提供Web Service容器,由WSS4J提供安全机制,给出了"数字签名+报文加密+身份认证"的组合安全策略,并在现代物流实验中心运用Tuscany作为SCA中间件,运用这种组合安全策略作出了应用实验。
关键词 XFIRE WSS4J WEB Service组合安全策略
下载PDF
Optimal configuration of firewall, IDS and vulnerability scan by game theory 被引量:7
2
作者 赵柳榕 梅姝娥 仲伟俊 《Journal of Southeast University(English Edition)》 EI CAS 2011年第2期144-147,共4页
The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash... The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash equilibrium for two portfolios of only deploying IDS and vulnerability scan and deploying all the technologies is investigated by backward induction. The results show that when the detection rates of IDS and vulnerability scan are low, the firm will not only inspect every user who raises an alarm, but also a fraction of users that do not raise an alarm; when the detection rates of IDS and vulnerability scan are sufficiently high, the firm will not inspect any user who does not raise an alarm, but only inspect a fraction of users that raise an alarm. Adding firewall into the information system impacts on the benefits of firms and hackers, but does not change the optimal strategies of hackers, and the optimal investigation strategies of IDS are only changed in certain cases. Moreover, the interactions between IDS & vulnerability scan and firewall & IDS are discussed in detail. 展开更多
关键词 economics of information systems FIREWALL intrusion detection system (IDS) vulnerability scan securityportfolio strategy
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部