期刊文献+

入侵容忍技术在电力企业网络安全中应用

下载PDF
导出
摘要 随着计算机网络及电网自动化水平的提高,电力企业对信息系统的依赖性越来越强,同时面临的安全问题也越来越大。在口新月异的攻击手段面前,依靠传统安全技术来维护系统安全远远不够。本文针对电力企业信息网络的特点,探讨了如何运用入侵容忍技术来保护信息系统的正常运行。
作者 周湘根
出处 《中小企业管理与科技》 2009年第21期276-276,共1页 Management & Technology of SME
  • 相关文献

参考文献3

二级参考文献20

  • 1Pal P P,Webber F,Schantz R E, et al. Intrusion Tolerant Systems. IEEE Information Survivability Workshop(ISW-2000)
  • 2Stavridou V, Dutertre B, Riemenschneider R A, et al. Intrusion Tolerant Software Architectures. In: Proc. of the DARPA Information survivability Conference and Exposition(DISCEXII'01)
  • 3Madan B B, Goseva-Popstojanova K,Vaidyanathan K, Trivedi K S. Modeling and quantification of security attributes of software systems. In:Proc. Int. Conf. DSN, (IPDS stream), volume 2,2002. 505-514
  • 4Cachin C, Poritz J A. Secure Intrusion-tolerant Replication on the Internet. In:Proc. of the Intl. Conf. on Dependable Systems and Networks (DSN'02)
  • 5Hiltunen M A,sehlichting R D,Ugarte C A. Building Survivable Services Using Redundancy and Adaptation. IEEE transactions on computers ,2003,52(2) : 181-194
  • 6Wang F,Gong F,Sargor G,et al. SITAR: A Scalable Intrusion Tolerance Architecture for Distributed Server. IEEE SMC Information Assurance Workshop' 01
  • 7Wolf A L,Heimbigner D,Bend J K. Don't Break: Using Reconfiguration to Achieve Survivability. IEEE Information Survivability Workshop(ISW-2000)
  • 8Valdes A, Almgren M, Cheung S, et al. Dependable Intrusion Tolerance: Technology Demo. In: Proc. of the DARPA Information Survivability Conference and Exposition(DISCEX'03)
  • 9Kihlstorm K P, Moser L E,Melliar-Smith P M. The SecureRing Group Communication System. ACM transactions on Information and System Security,2001, 4(4) :371-406
  • 10Dutertre B, Sa idi H, Stavridou V. Intrusion-Tolerant Group Management in Enclaves. DSN'01

共引文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部