期刊文献+

涉密计算机信息安全管理体系的设计与实现 被引量:40

Design and realization of information security manage system on secret computer
在线阅读 下载PDF
导出
摘要 详细分析了涉密计算机信息系统安全防护中存在的主要问题,参照涉密计算机信息系统安全保密防护规范和准则,研究了信息安全管理体系多层次多方面的防护技术措施,提出了一种全面可靠的信息安全管理体系设计和实现方法。实验结果表明了体系设计的安全性和有效性,为同类系统的信息安全管理体系设计提供了有益的参考。 It is analyzed that main problem of the safety protection for involved secret computer information system, though referencing the standard of the safety protection for involved secret computer information system and studying the that how to design an overall and credible system of safety protection, it brought forward a way to design and realize an overall and credible system of safety protection particularly. The application results show that the system can lead to security and reliability, which is of certain valuable reference to information security management of the similar corresponding systems.
出处 《计算机工程与设计》 CSCD 北大核心 2010年第18期3964-3967,3971,共5页 Computer Engineering and Design
关键词 涉密计算机信息系统 信息安全管理体系 安全防护 加密保护 集中控管 computer system for secret information information security management system safety protection protection of encryption concentrative control
  • 相关文献

参考文献7

二级参考文献17

  • 1韦鹏程,张伟,廖晓峰,杨华千.基于双混沌系统的带秘密密钥散列函数构造[J].通信学报,2006,27(9):27-33. 被引量:19
  • 2邓志宏,颜君彪,蔡悦华,蔡海滨.基于PKI的网络信息安全模型的研究与设计[J].计算机工程与设计,2007,28(2):349-350. 被引量:13
  • 3赵勇,刘吉强,韩臻,沈昌祥.信息泄露防御模型在企业内网安全中的应用[J].计算机研究与发展,2007,44(5):761-767. 被引量:29
  • 4卿斯汉.对二十一世纪我国信息安全领域发展的几点看法[M].中国科学院,2001..
  • 5孙知信,任志广,杨熙,王成.基于多层检测的网络安全防范系统[J].通信学报,2007,28(7):61-69. 被引量:5
  • 6Yoohwan K,Wing C L,Mooi C C.Packet score:A statistics-based packet filtering scheme against distributed denial-of-service attacks [J]. Dependable and Secure Computing IEEE Transactions,2006,3(2):141-155.
  • 7Machado R B,Boukerche A,Sobral J B M,et al.A hybrid artificial immune and mobile agent intrusion detection based model for computer network operations [C]. Parallel and Distributed Processing Symposium,2005.
  • 8Jean K J, Lin S H, Fung A R W.A study on information security management system evaluation - assets, threat and vulnerability [J]. Computer Standards and Interfaces,2004(26): 501-513.
  • 9Coles R S, Moulton R. Operationalizing IT risk management [J]. Computers and Security,2003,22(6):487-493.
  • 10Gerber M,Solms R V, From risk analysis to security requirements [J].Computers and Security,2001,20(7):577-584.

共引文献89

同被引文献117

引证文献40

二级引证文献96

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部