1[1]Saaty T L. The Analysis Hierarchy Process[M].Mc Graw Hill Inc, 1980.
2[2]NIST Special Publication 800-30[Z].NIST,2001.
3[5]Fites P E,Kratz M P, Brebner A F.Control and Security of Security of Computer Information Systems[M].Rockville,MD, Computer Science Press Inc.,1989.