期刊文献+

基于层次分析法的信息系统脆弱性评估方法 被引量:20

Vulnerability Assessment Method of Information System Based on Analytic Hierarchy Process
下载PDF
导出
摘要 脆弱性评估是信息系统安全风险评估过程中的一个重要环节,本文结合层次分析法AHP(AnalyticHierar-chyProcess),提出了一种信息系统脆弱性量化评估方法。 Vulnerability assessment is an important aspect of information system security risk assessment process. Combined with AHP(Analytic Hierarchy Process), we provide a quantitative vulnerability assessment method of information system.
出处 《计算机科学》 CSCD 北大核心 2006年第12期62-64,共3页 Computer Science
基金 国家自然科学基金项目:PKI安全综合评价体系的研究(60373021)。
关键词 脆弱性 信息系统 层次分析法 Vulnerability, Information system, Analytic hierarchy process
  • 相关文献

参考文献8

二级参考文献25

  • 1鲜明 等.国家自然基金报告[R].长沙:国防科技大学,2003.7-33.
  • 2胡影.[D].长沙:国防科技大学,2003,5-31.
  • 3Satty T L. How to Make a Decision:The Analytic Hierarchy Process[J]. European Journal of Operational Research, 1990,1(48):9-26.
  • 4Miksell S, Nainis W S, James H M. Security Vulnerability Assessment Tools for Internet Applications[R]. White Paper, Information Technology Support Center, 2001.
  • 5United States General Accounting Office, Accounting and Information Management Division. Information Security Risk Assessment[Z]. Augest 1999.
  • 6National Institute of Standards and Technology. Special Publications 800-30, Risk Management Guide(DRAFT)[Z]. June 2001.
  • 7BUTLER S A, FISCHBECK P. Multi-Attribute Risk Assessment, Technical Report CMD-CS-01-169[R]. December 2001.
  • 8BUTLER S A. Security Attribute Evaluation Method: A Cost-Benefit Approach[Z]. Computer Science. Department, 2001.
  • 9PELTIER T R. Information Security Risk Analysis[Z]. Rothstein Associates Inc, 2001.
  • 10Alberts Christopher J,Behrens Sandra G,Pethia Richard D.et al.Operationally Critical Threat,Asset,and Vulnerability EvaluationSM (OCTAVSM) Framework( Version 1.0).Pittsburgh,PA:Software Engineering Institute,Carnegie Mellon University,1999-06

共引文献335

同被引文献147

引证文献20

二级引证文献90

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部