期刊文献+

脆弱性数据库系统的设计及构建 被引量:3

Design and Construction of Vulnerability Database System
在线阅读 下载PDF
导出
摘要 指出了构建脆弱性数据库的重要意义,介绍了目前国际上主要的几个脆弱性数据库,然后具体阐述了一个脆弱性数据库系统的设计与构建。 This thesis indicates the significance of constructing a vulnerability database, introduces several vulnerability databases. After that the paper expatiates the structure of a vulnerability database system.
出处 《计算机工程》 CAS CSCD 北大核心 2004年第9期195-196,F003,共3页 Computer Engineering
关键词 脆弱性数据库 信息安全 系统设计 ICAT数据库 Vulnerability Database Information security
  • 相关文献

参考文献3

  • 1Krsul I. Software Vulnerability Analysis. Department of Computer Sciences,PurdueUniversity, 1998
  • 2Mann D E,Christey S M. Towards a Common Enumeration of Vulnerabilities [A/OL]. http/cve.mitre.org/docs/cerias.html, 1999
  • 3Kni ght E.Computer Vulnerabilities.http:∥www.securityparadigm.com/.2000

同被引文献44

  • 1张永铮,云晓春,胡铭曾.基于特权提升的多维量化属性弱点分类法的研究[J].通信学报,2004,25(7):107-114. 被引量:35
  • 2欧鑫凤,胡铭曾,张涛,张永铮.弱点数据库的建构及其应用研究[J].计算机应用研究,2007,24(3):213-214. 被引量:3
  • 3Power R. Current And Future Danger: A CSI Primer of Computer Crime & Information Warfare. CSI Bulletin, 1996
  • 4Du W,Mathur A P. Categorization of software errors that led to security breaches. Proceedings of the 21st National Information Systems Security Conference (NISSC' 98), 1998. http://www.cerias. purdue. edu/homes/duw/research/paper/nissc98, ps
  • 5Aslam T. A Taxonomy of Security Faults in the Unix Operating System: [M. S. thesis]. Purdue University, 1995
  • 6Aslam T, Krsul I, Spafford E H. Use of a taxonomy ot security faults. In: the 19th National Information System Security Conf.Baltimore, Maryland, 1996. 22-25
  • 7Bishop M. A taxonomy of Unix system and network vulnerabilities: [Technical Report CSE-9510]. Department of Computer Science, University of California at Davis,May 1995
  • 8Knight E, Hartley B V. Is your network inviting an attack, Internet Security Advisor, 2000(5-6): 2-5
  • 9Venter H S, Eloff J H P. Harmonised vulnerability categories.South African Computer Journal, 2003,29 : 24 - 31
  • 10CERT/CC. CERT/CC Vulnerability Notes Database. Information from the web at http://www. kb. cert. org/vuls/2005

引证文献3

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部