期刊文献+

网络安全需求分析及安全策略研究 被引量:19

The Analysis of Network Security Requirement and Security Policy Research
在线阅读 下载PDF
导出
摘要 介绍网络安全与风险成本分析方法。通过量化风险成本分析得到资产安全需求,把网络划分成安全区域。 This paper introduces network security and risk-cost analysis method, obtains security requirements of assets and divides network into security areas, by quantifying risk-cost analysis,At last it gives some advice of security policy.
出处 《计算机工程》 CAS CSCD 北大核心 2000年第6期56-58,共3页 Computer Engineering
关键词 安全需求 安全策略 网络安全 WWW Security requirement Security policy Security threat Risk Cost
  • 相关文献

参考文献1

同被引文献78

  • 1胡美燕,刘然慧.DES算法安全性的分析与研究[J].内蒙古大学学报(自然科学版),2005,36(6):693-697. 被引量:21
  • 2韩东海,王超,李群编.网络安全技术概论[M].北京:国防工业出版社,2003.
  • 3Request For Comment 1244 [EB/OL]. Holbrook J paul, Reynolds Joyce K.1991.
  • 4Improving Computer Security through Network Design [EB/OL]. Smith Danny. 1997.
  • 5Network Security Planning[EB/OL]. http://www.reliable.net/security.htm. 2000.
  • 6Network Security White Paper[EB/OL]. http://www.attrition.org/-modify/ texts/security/whtpap2.html. 2000.
  • 7Rushby J. Security Requirsments Specifications : How and What.Symposium on Requirements Engineering for Information Security(SREIS), 2001.
  • 8Helmer G,et al. A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System. Symposium on Requirements Engineering for Information Security (SREIS),2001.
  • 9Lutz R R. Software Engineering for Safety: A Roadmap. Future of Software Engineering(FoSE) at ICSE'00, 2000.
  • 10The International Organization for Standardization. Common Criteria for Information Technology Security Evaluation. ISO/IEC1S408:1999(E), 1999.

引证文献19

二级引证文献47

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部