期刊文献+

网络信息安全综合测试与仿真验证技术 被引量:1

Network Information Security Synthesis Test and Simulation Validation Technology
下载PDF
导出
摘要 提出采用信息安全模拟仿真、安全综合测试、系统级安全评估技术实现的网络信息安全综合测试与仿真验证系统的技术框架、关键技术及解决途径。此系统可对军工信息系统建设方案、安全技术、管理手段进行测试与评估。 The technology framework, key technology and solution of network information security synthesis test and simulation validation technology system are presented, which is realized based on information security simulation, security synthesis test and system security evaluation technology. The system can test and evaluate the construction scheme, security technology, management means of military industry information system.
作者 雷璟 王冬海
出处 《电讯技术》 北大核心 2010年第5期99-103,共5页 Telecommunication Engineering
关键词 军工信息系统 网络信息安全 综合测试 仿真验证 military industry information system network information security synthesis test simulation validation
  • 相关文献

参考文献4

二级参考文献6

  • 1W.Richard Stevens 范建华等(译).TCP/IP详解第一卷--协议[M].北京:机械工业出版社,2000..
  • 2Bouti A,Ait K D.A State-of-the-art Review of FMEA/FMECA.International Journal of Reliability,Quality and Safety Engineering,1994,1: 515-543
  • 3IEC 1025: 1990 Fault Tree Analysis (FTA)
  • 4Barber B,Davey J.The Use of the CCTA Risk Analysis and Management Methodology CRAMM.Proc.MEDINFO92,North Holland,1992: 1589-1593
  • 5AS/NZS 4360: 1999 Risk Management,1999[4]
  • 6ISO/IEC TR 13335-1:2001: Information Technology - Guidelines for the Management of IT Security-Part 1: Concepts and Mo- dels for IT Security,2001

共引文献10

同被引文献18

  • 1陈帅,钟先信,巫正中.无线传感器网络混沌分组密码研究[J].中国科学(F辑:信息科学),2009,39(3):357-362. 被引量:6
  • 2Ahlswede R, Cai N, Li R, et al. Network Information Flow [J]. IEEE Transactions on Information Theory,2000,46(4) : 1204- 1216.
  • 3Li S Y, Yeung R W, Cai N. Linear network coding[J]. IEEE Transactions on Information Theory,2003,49(2) :371 - 381.
  • 4Cai N, Yeung R W. Secure network coding[ C ]//Proceedings of 2002 IEEE International Symposium on Information Theory. Lausanne, Switzerland: IEEE, 2002: 323.
  • 5Cai N, Yeung R W. A security condition for multi-source linear network coding[C]//Proceedio.gs of 2007 IEEE International Symposium on Information Theory. Los Alamitis, CA, USA: IEEE, 2007 : 561 - 565.
  • 6Jain K. Security based on network topology against the wiretapping attack[J]. IEEE Wireless Communications, 2004,11 (1) :68 - 71.
  • 7Bhattad K, Narayanan K R. Weakly secure network coding [ C ]//Proceedings of First Workshop on Network Coding, Theory, and Applications. Riva del Garda, Italy: IEEE, 2005 : 1 - 5.
  • 8Lima L, Medard M, Barros J. Random linear network coding: A free cypher? [C]// Proceedings of 2007 IEEE International Symposium on Information Theory. Washington, DC: IEEE,2007:546 - 550.
  • 9Feldman J, Malkin T,Stein C, et al. On the capacity of secure network coding[ C]//Proceedings of the 42nd Annual Allerton Conference on Communication, Control, and Computing. Monticello, IL, USA: IEEE, 2004.
  • 10Jain K. Security based on network topology against the wiretapping attack [ J]. IEEE Wireless Communications, 2004, 11(1):68-71.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部