期刊文献+

基于AHP度量模型的安全管理度量方法 被引量:1

Method of Security Management Metrics Based on AHP Model
下载PDF
导出
摘要 本文以GB17859、ISO/IEC17799等相关标准作为指导依据,针对信息安全管理绩效的度量问题提出了一套基于AHP模型的安全管理度量方法,并重点阐述了度量模型中度量要素、度量指标的权重计算问题。 To solve the question of how to evaluate the performance of information security management, this paper, directed by the criterion GB17859 and ISO/IEC17799, explores one kind of method of security management metrics based on AHP model, and makes the emphasis on how to decide the weight of two kinds of metric elements.
出处 《微计算机信息》 北大核心 2007年第18期33-34,160,共3页 Control & Automation
基金 国家自然科学基金项目(60572162)资助
关键词 信息安全 安全管理度量 层次分析法 Information Security, Security Management Metrics, Analytic Hierarchy Process
  • 相关文献

参考文献6

  • 1SC27N4474:WD 27004-Information technology-Security techniques-Information security metrics and measurements,June 30,2005
  • 2NIST SP 800-55:Security Metrics Guide for Information Technology Systems,NIST,2003
  • 3ISO/IEC17799:2005 Information technology-Code of practice for information security management,2005.11
  • 4王晓丹,政府机关内部信息安全管理问题研究[M],2003.9
  • 5GB17859.计算机信息系统安全保护等级划分准则[S].[S].公安部,1999..
  • 6张俊,江汉红,陈少昌.Internet网络攻击与抵御的层次化分析[J].微计算机信息,2005,21(1):164-166. 被引量:30

二级参考文献1

  • 1[美]JamesF.Kurose eithW.Ross.Computer Networking[M].北京:高等教育出版社,2001.08..

共引文献36

同被引文献15

  • 1王涛,郭荷清,姚松涛.基于综合安全保护质量的安全服务协商模型[J].计算机工程与科学,2006,28(4):26-29. 被引量:1
  • 2Howard M,Pincus J,Wing J M.Measuring relative attack surfaces[C]//Proc,of Workshop on Advanced Developments in Software and Systems Security.Taipei,2003.
  • 3Manadhata P,Wing J M.Measuring a system's attack surface[R].CMU-CS-04-102.Computer Science Department of Camegie Mellon University,2004.
  • 4Manadhata P,Wing J M.An attack surface metric[R].CMUCS-05-155.Computer Science Department of Carnegie Mellon University,2005.
  • 5Manadhata P,Wing J,Flynn M,et al.Measuring the attack surfaces of two FTP daemons[C]//Proceedings of the 2nd ACM Φorkahop on Quality of Protection.Alexandria VA,USA,2006.
  • 6Manadhata P,Kaynar D K,Wing J M.A formal model for a system's attack surface[R].CMU-CS-07-144.Computer Science Department of Carnegie Mellon University,2007.
  • 7Mirkovic J,Reiher P,Fahmy S,et al.Measuring Denial of Service[C]//Proceedings of the 2nd ACM Workshop on Quality of Protection.Alexandria VA,USA,2006.
  • 8Pamula J,Jajodia S,Ammann P,et al.A Weakest-adversary Security Metric for Network Configuration Security Analysis[C]//Proceedings of the 2nd ACM Workshop on Quality of Protection.Alexandria VA,USA,2006.
  • 9Wang Lingyu,Singhal P A,Jajodia P S.Toward measuring network security using attack graphs[C]//Proceedings of the 2nd ACM Workshop on Quality of Protection.Alexandria VA,USA,2007.
  • 10Ozment A.Improving vulnerability discovery models[C]//Proceedings of the 20d ACM Workshop on Quality of Protection.Alexandria VA,USA,2007.

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部