期刊文献+

电子政务风险评估方法

the Research on Risk Evaluation Methods in E-Government
下载PDF
导出
摘要 分析了电子政务中的静态风险评估方法,并在此基础上提出将基于人工免疫的动态风险评估方法应用于电子政务系统中,该方法实时监控电子政务系统中的风险状态,根据免疫系统中的抗体浓度得到当前系统遭受的风险,反馈到整个电子政务系统中,阻止系统的危险活动,提高电子政务系统的安全。 Static Risk Evaluation methods in e-government system are analyzed in this paper, based on this artificial immune system based risk evaluation method is presented to apply to the e-government system. This dynamic method can monitor the risk in e-government system and get to know the risk the system is suffering. After knowing which kind of risk, the corresponding safe action will be act upon the whole system and hold back those dangerous activities, improving the security of the E-government system.
作者 周萍
出处 《科技广场》 2007年第11期105-107,共3页 Science Mosaic
关键词 风险评估 电子政务 系统安全 人工免疫 Risk Evaluation E-government System Safety Artificial Immune System
  • 相关文献

参考文献5

二级参考文献34

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:308
  • 2United States General Accounting Office, Accounting and Information Management Division. Information Security Risk Assessment[Z]. Augest 1999.
  • 3National Institute of Standards and Technology. Special Publications 800-30, Risk Management Guide(DRAFT)[Z]. June 2001.
  • 4BUTLER S A, FISCHBECK P. Multi-Attribute Risk Assessment, Technical Report CMD-CS-01-169[R]. December 2001.
  • 5BUTLER S A. Security Attribute Evaluation Method: A Cost-Benefit Approach[Z]. Computer Science. Department, 2001.
  • 6PELTIER T R. Information Security Risk Analysis[Z]. Rothstein Associates Inc, 2001.
  • 7Visintine V. An Introduction to Information Risk Assessment. SANS institute, 2003.8.
  • 8Alberts C J, Dorofee A J. OCTAVE^SM Method Implementation Guide, v2.0. Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 2001.
  • 9Jonsson E, Olovsson T. A quantitative model of the security intrusion process based on attacker behavior. IEEE Trans on Software Engineering, 1997, 23(4): 235~245.
  • 10Ortalo R, Deswarte Y, Kaaniche M. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Trans on Software Engineering, 1999, 25(5): 633~650.

共引文献352

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部