期刊文献+

电子政务信息网络安全评估系统的研究与实现 被引量:2

Research on and Implementation of the Network Security Assessment System of E-government Information
下载PDF
导出
摘要 提出了一种基于Agent的电子政务信息网络安全评估系统模型,详细分析了模型的体系结构、优点和实现的关键技术,通过系统实验验证了该模型在电子政务信息安全风险评估中的性能。 This paper puts forward an E-government information network security assessment system model based on Agent, makes detailed analysis on the architecture,merits and key technologies of the model, and proves the performances of the model in E-government information security risk assessment through the system test.
出处 《科技情报开发与经济》 2009年第22期85-88,共4页 Sci-Tech Information Development & Economy
关键词 电子政务信息 网络安全 评估系统 E-government information network security assessment system
  • 相关文献

参考文献7

  • 1Jennings N R,Wooldridge M.Applications of Intelligent Agents [ EB/OL ].[ 2009-04-29 ].http://www.cs.umbc.edu/agents/introduction / jennings98.pdf.
  • 2马恒太,蒋建春,陈伟锋,卿斯汉.基于Agent的分布式入侵检测系统模型[J].软件学报,2000,11(10):1312-1319. 被引量:122
  • 3中国互联网络信息中心.计算机信息系统国际联网保密管理规定[EB/0L].[2009-04-29].http://www.clinic.net.cn/html/Dic/2003/11/27/1482.htm.
  • 4美国国家安全局.信息保障技术框架[M].北京:北京中软电子出版社,2000:7-8.
  • 5Dan Farmer, Gene Spafford.Computer Oracle and Password System [ EB/OL]. [ 2009-04-29 ]. ftp://coast.cs.purdue.edu/pub/tools/ unix/scanners/cops/.
  • 6Dan Farmer, Wietse Venema.Security Administrator Tool for Analyzing Networks[ EB/OL]. http://www.porcupine.org/satan/.
  • 7MITRE Corporation.Common V ulnerabilities and Exposures [ EB/OL ]. [ 2009-04-29 ].http://c re. mitre.org.

二级参考文献7

  • 11,Bishop M. A model of security monitoring. In: Proceedings of the 5th Annual Computer Security Applications Conference. 1989. 46~52. http://seclab.cs. ucdavis.edu/papers.html
  • 22,Staniford-Chen S, Cheung S, Crawford R et al. GrIDS: a graph based intru sion detection system for large networks. In: Proceedings of the 19th National Information Systems Security Conference, Vol 1. National Institute of Standards a nd Technology, 1996. 361~370
  • 33,Hochberg J, Jackson K, Stallings C et al. NADIR: an automated system for detecting network intrusion and misuse. Computers and Security, 1993,12(3):235~2 48
  • 44,White G B, Fisch E A, Pooch U W. Cooperating security managers: a peer-based intrusion detection system. IEEE Network, 1996,10(1):20~23
  • 55,Forrest S, Hofmeyr S A, Somayaji A. Computer immunology. Communications of th e ACM, 1997,40(10):88~96
  • 66,Hunteman W. Automated information system alarm system. In: Proceedings of the 20th National Information Systems Security Conference. National Institute of Standards and Technology, 1997
  • 77,Porras P A, Neumann P G. EMERALD: event monitoring enabling responses to anom alous live disturbances. In: Proceedings of the 20th National Information System s Security Conference. National Institute of Standards and Technology, 1997

共引文献121

同被引文献7

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部