期刊文献+

网络安全综合评价方法在网络建设中的应用研究 被引量:2

Application Research of Comprehensive Evaluation Methods of Network Security in the Network Construction of Hebei Examination Authority
下载PDF
导出
摘要 本文通过对网络安全评价研究现状的分析,深入探讨了网络安全综合评价理论;并依据网络安全评价理论,对网络安全综合评价方法进行了深入的研究;设计并提出了一种网络安全综合评价方法;并把这种方法应用了到省考院网络建设中,完成了对网络安全进行全面的评价的工作。最后,将网络安全综合评价理论应用到了省考院网络建设的网络安全验收过程中。 This paper deeply explores theories of comprehensive evaluation on network security by analyzing the current situation of studies on network security evaluation. It further studies the comprehensive evaluation methods of network security according to the evaluation theories of network security. It proposes a kind of comprehensive evaluation method of network security. This method has already been used in the construction of network of Hebei Examination Authority and completed the comprehensive evaluation on the network security. Finally, the theory of comprehensive evaluation on network security has been applied in the inspection of construction of the network of Hebei Examination Authority.
作者 刘霞
出处 《邢台职业技术学院学报》 2014年第5期75-79,共5页 Journal of Xingtai Polytechnic College
基金 河北省教育厅自然科学指导计划项目--"基于WPF&WebGis的邢台数字城建档案集成系统的研究与实现" 项目编号:Z2014140
关键词 网络安全 递阶层次结构 综合评价 安全系数 network security hierarchical structure comprehensive evaluation security coefficient
  • 引文网络
  • 相关文献

参考文献4

二级参考文献3

  • 1Security Risk Analysis And Management. http://www.nr.no/-abie/RA_by_Jenkins.pdf. 2004
  • 2Casey K. Fung. A Framework for Modeling Security and Integrity in CapBasED-AMS. http://csdl2.computer.org/dl/proceedings/eee/2005/2274/O0/22740068.pdf, 2005
  • 3Kraus S. Negotiation and cooperation in Multi-agent environment.Artificial Intelligence, 1997,(94): 79-97.

共引文献9

同被引文献3

引证文献2

二级引证文献2

;
使用帮助 返回顶部