期刊文献+

信息安全保障评价指标体系的研究 被引量:17

Research of Indicator for Information Assurance Evaluation
下载PDF
导出
摘要 信息安全保障与信息系统本身一样是一个复杂的系统。为了能够很好反映信息安全保障系统的功效,需要用可量化的参数作为衡量指标。从中国信息安全保障的国家战略、管理策略、工程规范和技术措施方面出发,提出了以"安全基线政策"(Security Baseline Policy)为核心的信息安全评价指标体系(Indicator);研究了具有双重反馈的评价思想和流程。利用信息安全保障评价指标体系有助于建立信息系统安全保障的长效机制,增强信息系统的安全性。 Both information system and information assurance are complex systems. To demonstrate the efficiency of information assurance better,it needs the quantitative parameters which are used as the indicators for the purpose of security evaluation. This paper presented the indicators for information assurance based on the core of security baseline policy,which is extracted from the juristic documents of national stratagem, management policy, engineering criterion, and technique measurements. The evaluate methods and procedures with double feedbacks were given in this paper. The indicators will help to improve the efficient and persistent of information assurance, and make the information system more secure.
出处 《计算机科学》 CSCD 北大核心 2010年第7期7-10,82,共5页 Computer Science
基金 国家973项目(No.2007CB311203) 国家863计划(No.2009AA012439) 国家自然科学基金委员会与中国民用航空总局联合资助项目(No.60776808) 天津市应用基础及前沿技术研究计划项目(No.09JCYBJC00400)资助
关键词 评价指标体系 信息安全保障 安全基线政策 评价 Indicator,Information assurance,Security baseline policy,Evaluation
  • 相关文献

参考文献20

  • 1Network Evaluation and Benchmarking Standard Service Level Agreement (SLA)[R].University of Michigan,Information Technology,2004:1-47.
  • 2Executive office of the president Washington dc national science and technology council.Federal Plan for Cyber Security and Information Assurance Research and Development[R].2006:1-140.
  • 3Evans D W,Chatmon C L.Increasing minority participation in information assurance[C] ∥Proc.of Information Technology Based Higher Education and Training,6th ITHET International Conference.2005:12 -15.
  • 4Systems Security Engineering Capability Maturity Model SSE-CMM Model Description Document Version 3.0[R].Carnegie Mellon University,2003:1-150.
  • 5Peltier T R.Information Security Risk Analysis[M].Boca Raton,Florida:CRC Press LLC,2001.
  • 6Butler S A.Security Attribute Evaluation Method:A Cost-benefit Approach[C] ∥24th International Conference on Software Engineering.ACM,2002:230-240.
  • 7Vaughn R B Jr,Henning R,Siraj A.Information Assurance Measures and Metrics-State of Practice and Proposed Taxonomy[C] ∥Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS'03).Big Island:Hawaii,2003.
  • 8Seddigh N,Pieda P.Current Trends and Advances in Information Assurance Metrics[C] ∥ Proceedings of the Second Annual Conference on Privacy,Security and Trust.Privacy,Security,and Trust,2004:197-205.
  • 9Lu Xin,Ma Zhi.Information Assurance Evaluation for Network Information Systems[C] ∥Computational Intelligence and Security.Guangzhou,China:Springer,2006:869-877.
  • 10吕欣.信息系统安全保障理论与评价指标体系[J].微电子学与计算机,2006,23(10):10-12. 被引量:18

二级参考文献47

共引文献194

同被引文献155

引证文献17

二级引证文献67

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部