期刊文献+

信息安全评估模型的研究与实现 被引量:6

RESEARCH AND IMPLEMENTATION OF MODEL OF INFORMATION SECURITY EVALUATION
在线阅读 下载PDF
导出
摘要 提出一个信息技术安全评估模型。通过对安全测试评估的内容和功能的研究分析,给出了安全评估模型和安全评估平台的体系结构,介绍了系统实现情况。本评估模型具有对安全测试和评估过程进行组织、管理和调度等功能,并具有通用性、集成性和结构可配置等特点。 An information security evaluation model is proposed. Based on the analyses of contents and functions of security evolution, the architecture of the security evaluation model and platform is presented, and its implementation is given. The main functions of this model are to organize, manage and control the secuiity test and evaluation. It also has features in generalization, integration and configuration.
出处 《计算机应用与软件》 CSCD 北大核心 2007年第11期5-8,共4页 Computer Applications and Software
基金 国家自然科学基金(60473053) 国家863计划(2004AA147070) 江苏省自然科学基金(BK2005074) 国家自然科学基金(60503020)资助
关键词 信息系统 通用准则 安全评估模型 平台体系结构 Information system Common critetia Security evaluation model Platform architecture
作者简介 周国强,讲师,主研领域:信息安全,分布计算。
  • 相关文献

参考文献13

  • 1CC, Common Criteria for Information Technology Security Evaluation, Partl : Introduction and general model ,version 2.1, August 1999, CCIMB-pp-031.
  • 2Bottomly R. CC Part2 : Security Functional Requirements ,2002.
  • 3GPernul. Information Systems Security: Scope, State-of-the-art, and Evaluation of Techniques, International Journal of Information Management, 1995,15 (3) : 165 - 180.
  • 4Olthoff K. Thoughts and Questions on Common Criteria Evaluaions, 23rd Natinal Information Systems Security Conference,2000.
  • 5Lynette Bamard, Prof Rossouw von Solms. A Formalized Approach to the Effective Selection and Evaluation of Information Security Controls, Computer& Security ,2000,19 ( 2 ).
  • 6Kruger R, Eloff J. A Common Criteria framework for the evaluation of Information Technology system Security. IFIP TCll 12, intemational conference on Information Security ( SEC" 97 ). Copenhagen, Denmark, Chapman&Hall.
  • 7Andersson, Richard. Evaluation of the Security of Components in Distributed Information Systems, LITH-ISY-EX-3430-2003, Linkoping University, Sweden,2003.
  • 8Irwin Meisels, Mark Saaltink. The Z/EVES Reference Manual, https :// wwww. se. auckland, ac. nz/courses/SOFTENG461/resources/zeves/ RefrenceManual. pdf.
  • 9Wang C, Wulf W, A framework for Securitymeasurement, NISSC97, 1997.
  • 10Strous L. Security Evaluation Criteria, Computer &Security, 1994,13.

同被引文献18

引证文献6

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部