5Information technology-Guidelines for the management of IT Security-Part 3:Techniques for the management of IT Secutity[S].ISO/IEC TR 13335-3:1998(E),1998.
7The Information Assurance Technical Framework (IATF),Release 3.1,NSA,September 2002.
8Security Management Infrastructure(SMI)Task 1 Team,Threat and Vulnerability Model for Information Security,1997.
9The International Organization for Standardization.Common Criteria for Information Technology Security Evaluation-Part 3:Security Assurance Requirements[S].ISO/IEC 15408-3:1999(E),1999.
10Saaty T L.The Analysis Hierarchy Process[M].New York,McGraw Hill,1980,Reprinted by RWS Publication,Pittsburgh,1996.