期刊文献+

一种基于真实和匿名地址的网络数据分类方法

下载PDF
导出
摘要 提出了一种基于真实地址和匿名地址的控制数据和应用数据的网络地址数据分类方法,并在均衡网络可管理性及开放性、安全性和用户隐私性的条件下,建立了相应的全局访问控制规则。
作者 吴飞
出处 《长江大学学报(自科版)(上旬)》 CAS 2008年第1期244-246,共3页 JOURNAL OF YANGTZE UNIVERSITY (NATURAL SCIENCE EDITION) SCI & ENG
  • 相关文献

参考文献2

二级参考文献72

  • 1林闯,任丰原.可控可信可扩展的新一代互联网[J].软件学报,2004,15(12):1815-1821. 被引量:79
  • 2林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 3.中国互联网发展状况统计[EB/OL].http://www.cnnic.net.cn,.
  • 4Qu G.,Jayaprakash,Ramkishore M.,Hariri S.,Raghavendra C.S.A framework for network vulnerability analysis.In:Proceedings of the 1st IASTED International Conference on Communications,Internet,Information Technology (CⅡT2002),St.Thomas,Virgin Islands,USA,2002,289~298
  • 5Moore A.P.,Ellison R.J.,Linger R.C.Attack modeling for information security and survivability.Carnegie Mellon Univer sity:Technical Note CMV/SEI-2001-TH-001,2001
  • 6Jonsson E.,Olovsson T.A quantitative model of the security intrusion process based on attacker behavior.IEEE Transactions on Software Engineering,1997,23(4):235~245
  • 7Mahimkar A.,Shmatikov V.Game-based analysis of Denial-of-service prevention protocols.In:Proceedings of the IEEE Computer Security Foundations Workshop(CSFW05),Aix-en-Provence,France,2005,287~301
  • 8Xia Zheng-You,Zhang Shi-Yong.A kind of network security behavior model based on game theory.In:Proceedings of the 4th International Conference on Parallel and Distributed Computing,Applications and Technologies,PDCAT,Chengdu,China,2003,950~954
  • 9Avizenis A.,Laprie J.,Randell B.Fundamental concepts of dependability.In:Proceedings of the 3rd Information Survivability Workshop,Boston,MA,2000,7~12
  • 10Goseva-Postojanova K.,Wang F.,Wang R.,Gong F.,Vaidyanathan K.,Trivedi K.S.,Muthusamy B.Characterizing intrusion tolerant systems using a state transition model.In:Proceedings of DARPA DISCEX Ⅱ Conference,2001,Ⅱ(2):211~221

共引文献334

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部