期刊文献+

网络安全与身份认证

下载PDF
导出
摘要 本文系统介绍了计算机网络安全的完整概念和内容,详细分析了网络安全的体系结构,并深入探讨了身份认证的基本方法及其实现。
作者 吕振海
出处 《福建电脑》 2009年第6期56-56,共1页 Journal of Fujian Computer
  • 相关文献

参考文献4

二级参考文献13

  • 1[美]Bruce Schneier.应用密码学-协议、算法和V源程序[M].北京:机械工业出版社,2000.205-235,334-339.
  • 2陈彦学.信息安全理论与实务[M].北京:中国铁道出版社,2000.167-178.
  • 3D E Bell, L LaPadula. Secure Computer Systems:A Mathematical Model. Mitre Corporation, Bedford, Mass. 01730,January 1973.
  • 4M Abrams, L La Padula, M Lazear, I Olson. Reconciling a Formal Model and Prototype Implementation-Lessons Learned in Implementing the ORGCON Policy. Mitre Corporation, Bedford, Mass.01730, November 1991.
  • 5L La Padula. Rule-Set Modeling of Trusted Computer System. Essay 9 in: M Abrams, S Jajodia, H Podell. Information Security-An integrated Collection of Essays. IEEE Computer Society Press, 1995.
  • 6Fisher-Hubner S, Ott A. From a Formal Privacy Model to its Implementation. Proceedings of the 21st National Information Systems Security Conference (NISSC'98), Arlington,VA,1998, http://www.rsbac.org/niss98.htm.
  • 7Ott A, Fischer-Hubner S, Swimmer M. Approaches to Integrated Malware Detection and Avoidance. Proceedings of the 3rd Nordic Workshop on Secure IT Systems, Trondheim, November 5-6, 1998, http://www.rsbac.org/nordse98.htm.
  • 8Information Assurance Technical Framework. Version 3.1,Sept.2002, Issued by National Security Agency, Information Assurance Solutions, Technical Directors.
  • 9张翔.《信息安全系统模型、平台与工程》[EB/OL].http://www.antpower.org,.
  • 10思索.中间件的优点及其应用[EB/OL].www.yesky.com,2001.

共引文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部