期刊文献+

一体化网络安全策略模型设计研究

Research on the Design of Integrated Network Security Strategy Model
下载PDF
导出
摘要 目前,一体化网络主要通过加保密机、简单身份认证等手段保证信息的安全传输,还缺少有效的手段保证信息的验证、授权、机密性和完整性,特别是在无线网络传输中,由于传输介质的开放性,使得其安全性就显得犹为重要。本文围绕现代密码体制,建立并实现了一个安全实用的一体化网络安全策略模型。模型的体系结构主要由安全体制、网络安全连接及数据安全传输和管理三部分组成。 Recently, the integrated network mainly ensures the safe transmission of the information according to simply identification, which is in short of the method to ensure the confidentiality and integrality of the information identification and authentication. Espe- cially, due to the opening of the transmission medium in the wireless network, the security is becoming so important. The paper revolves the secret cipher system, established and realizes one security practical information safe transmission model. The model system structure is mainly composed by the security system, network security connection, and data safe transmission and management.
出处 《微计算机信息》 2009年第9期89-90,22,共3页 Control & Automation
关键词 一体化 网络安全 网络安全策略 Integrated Network Security Strategy
  • 相关文献

参考文献3

  • 1胡万兵,赵彬,周明,周保群.基于可能性计算模型的信息系统风险评估系统设计[J].微计算机信息,2006(01X):80-82. 被引量:13
  • 2S.H. (Basic) von Sohns, "Information security governance-compliance management vs operational management, "Computers & Security, 2005, no. 24: 443-447.
  • 3Prof Basle yon Solms, "Information Security - A Multidimensional Discipline, " Computers & Security, 2001, no. 20: 504-508.

二级参考文献7

  • 1于玲,王熙,杜向军,邰建华.一种基于XML的集中会议控制协议[J].微计算机信息,2005,21(12X):203-205. 被引量:2
  • 2许艳蕊 钟求喜 胡华平.网络漏洞扫描系统的功能分析与CIM建模[Z].,..
  • 3J.D. Nosworthy, "A Practical Risk Analysis Approach: Managing BCM Risk", Computers & Security, vol.19, pp.596-614, 2000.
  • 4C.J. Alberts and A.J. Dorofee, Managing Information Security Risks: The OCTAVE Approach, Addison Wesley Professional, 2002.
  • 5T.R.Pehier, Information Security Risk Analysis, Auerbach Publications,2001.
  • 6T. Bedford and R. Cooke, Probabilistic Risk Analysis: Foundations and Methods, Cambridge University Press, 2001.
  • 7international Organization for Standardization, Information Technology Code of Practice for Information Security Management, ISO/IEC 17799:2000 (E), 2000.

共引文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部