期刊文献+

基于灵敏度分析和综合权衡的信息安全管理系统评估 被引量:1

INFORMATION SECURITY MANAGEMENT SYSTEM EVALUATION BASED ON SENSITIVITY ANALYSIS AND TRADEOFF ANALYSIS
下载PDF
导出
摘要 采用灵敏度分析和综合权衡分析方法,研究信息安全管理系统的评估问题。构建一个包括整体评估、性能指标灵敏度分析和系统优化三个层面的信息安全管理系统评估框架,提出了包含综合权衡方法和灵敏度分析方法的用于信息安全管理系统的评估方法。 This study applies the tradeoff analysis and sensitivity analysis to evaluate the Information Security Management System (ISMS). It constructs an available framework for ISMS evaluation. This framework includes the holistic evaluation,the sensitivity analysis of quality attribute and the system optimization. It presents an effective methodology for ISMS evaluation. The methodology includes tradeoff analysis and sensitivity analysis. This study can summarize some interrelated theory and methodology for ISMS evaluation on the one hand, and can help the construction of the ISMS of our country on the other hand.
作者 郭昊
出处 《计算机应用与软件》 CSCD 北大核心 2008年第9期276-278,共3页 Computer Applications and Software
关键词 信息安全管理系统 评估 灵敏度分析 综合权衡 Information security management system Evaluation Sensitivity analysis Tradeoff analysis
  • 相关文献

参考文献9

  • 1Jean K J,Lin S H,Fung A R W. A study on information security management system evaluation-assets, threat and vulnerability [J].Computer Standards & Interfaces,2004 ( 26 ) :501 - 513
  • 2Herman D, Keith S. Application of the common criteria to a system:a ease study [ J ]. Computer Security Journal,2001 , 17 ( 2 ) :21 - 28.
  • 3Kazman R, Barbaeci M, Klein M, et al. Experience with performing architecture tradeoff analysis [ A]. In Proceedings of the 21st International Conferences on Software Engineering, 1999:54 - 63.
  • 4Kazman R, Asundi J, Klein M. Quantifying the costs and benefits of architectural decision [ A]. In Proceedings of the 23rd International Conference on Software Engineering,2001:297 -306.
  • 5Gross D, Yu E S K. From non-functional requirements to design through patterns [J].Requirement Engineering ,2001,6 ( 1 ) : 18 - 36.
  • 6Svahnberg M,Wohlin C, Lundberg L, et at. A quality-driven decisionsupport method for identifying software architecture candidates[J]. International Journal of Software Engineering and Knowledge, 2003,13 (5) :547-573.
  • 7Chung L, Nixon B A, Yu E, et al. Non-Functional Requirements in Software Engineering [ M]. Dordrecht :Kluwer Aeademic Publishers. 2000.
  • 8Giorini P, Mylopoulos J, Nicchiarelli E, et al. Formal reasoning techniques for goal models [ J ]. Journal on Data Semantics, 2004 ( 1 ) : 1 - 20.
  • 9Dobrica L, Niemela E. A survey on software architecture analysis methods [ J ]. IEEE Transactions on Software Engineering, 2002,28 ( 7 ) : 638 - 653.

同被引文献6

  • 1Horng-Twu Liaw. A secure electronic voting protocol for general elections [J]. Computers & Security, volume 23, Issue 2, March 2004, Pages 107-119.
  • 2Gianluca Dinio A secure and available electronic voting service for a large-scale distributed system [J]o Future Generation Computer Systems, volume 19, Issue 1, Pages 69-85.
  • 3Wei-Chi Ku, Sheng-De Wang, A secure and practical electronic voting scheme [J]. Computer Communications, volume 22, Issue 3, Pages 279-286.
  • 4Jinn-Ke Jan, Chih-Chang Taio A secure electronic voting protocol with IC cards [J]o Journal of Systems and Software, volume 39, Issue 2, Pages 93-101.
  • 5吴振纲 陈虎.PLC的人机接口与编程.微计算机信息,2005,8(1):21-23.
  • 6曾陈萍.基于多主体的信息安全管理系统研究与设计[J].计算机工程与设计,2008,29(19):5143-5145. 被引量:8

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部