2W E Burr.Public Key Infrastructure(PKI) Technical Specifications,Part A:Technical Concept of Operations[EB/OL].http://csrc.nist.gov/pki/twg/baseline/pkicon20b.pdf,1998-09.
3Varadharajan C Crall,J Pato.Issues in the Design of Secure Authorization Service for Distributed Applications[C].IEEE GLOBECOM,1998.874-879.
4Lyer R K,Sarkis J.Disaster Recovery Planning in an Automated Manufacturing Environment[J].IEEE Transactions on Engineering Management,1998,45(2).
5Frabutt Alan.Implementing Your Disaster Recovery Plan[J].Storage Management Solutions,1999,4(2).
6Lars Frank.Evaluation of the Basic Remote Backup and Replication Methods for High Availability Database[J].Software:Practice and Experience,1999,29(15).
7Hugo Patterson,Stephen Manley,Mike Federwisch,et al.SnapMirror:File-System-based Asynchronous Mirroring for Disaster Recovery[C].Monterey:The 1st USENIX Conference on File and Storage Technologies,2002.
8Mukherjee B,Heberlein L T,Levitt K N.Network Intrusion Detection[J].IEEE Network,1994.
9K Iglun,R A Kemmerer,P A Porras.State Transition Analysis:A Rule-based Intrusion Detection System[J].IEEE Transactions on Software Engineering,1995,21(3).