期刊文献+

基于多木桶模型的信息安全量化评估方案 被引量:10

Assessment method of information security based on multiple cask model
在线阅读 下载PDF
导出
摘要 提出基于木桶模型的信息安全评估方案;用特定计算实现木桶效应,再考虑现实安全系统的逻辑结构对信息评估方案设计的影响,提出并实现了基于多木桶模型的信息评估方案和公式体系。经实例数据分析验证,所获得的评估方案更符合现实情况、能更准确地反映安全水平。 This paper proposed a new quantity assessment method for information security based on multiple cask model,which considered and implemented the inflection of security system's logic structure to the assessment method and formula.The assessment method proposed is more according to the real situation and reflect the security level more correctly.
出处 《计算机应用研究》 CSCD 北大核心 2011年第5期1914-1917,1928,共5页 Application Research of Computers
基金 广东省自然科学基金资助项目(06300905) 广东科技计划资助项目(2007B010200069 2009B090300326)
关键词 信息安全 安全评估 量化评估 木桶理论 information security security assessment quantity assessment cask effect
  • 相关文献

参考文献7

  • 1付钰,吴晓平,严承华.基于贝叶斯网络的信息安全风险评估方法[J].武汉大学学报(理学版),2006,52(5):631-634. 被引量:39
  • 2KRISHNAMURTHY V, NARAYANAN K. Environment-aware trusted data delivery in multipath wireless protocols [ C ]//Proc of International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security ( MMM-ACNS- 2007 ). 2007:210-218.
  • 3陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:348
  • 4MATHEW S, SHAH C, UPADHYAYA S. An alert fusion framework for situation awareness of coordinated multistage attacks[C]//Proe of the 3rd IEEE International Information Assurance Workshop ( IWIA 2005). Maryland : College Park,2005:95-104.
  • 5ROBICHAUX B T. Defense-in-depth revisited: qualitative risk analysis methodology for complex network-centric operations [ C ]//Proc of Military Communications Conference ( MILCOM 2001 ). Washington DC : IEEE Computer Society,2001:64-70.
  • 6SIRAJ A, VAUGHN R B. A dynamic fusion approach for security situation assessment [C]//Proc of the 4th IASTED International Conference on Communication, Network and Information Security Table of Contents. Washington DC : IEEE Computer Society ,2007:77- 82.
  • 7HA D, UPADHYAYA S, NGO H Q ,et al. Insider threat analysis using information-centric modeling[ C ]//Proceeding of Advances in Digital Forensics m. Boston: Springer,2007:55-73.

二级参考文献10

共引文献384

同被引文献103

引证文献10

二级引证文献65

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部