期刊文献+

信息系统安全体系结构发展研究 被引量:13

Line of Development and Future Trend of Information System Security Architecture
下载PDF
导出
摘要 在简要回顾信息系统安全体系结构(ISSA)发展历程的基础上重点分析了ISSA的定义、研究意义、研究主题和思路、ISSA学科性质及方法论等基本问题,探讨了未来进一步发展ISSA在理论、技术、实施、应用4个领域所面临的挑战和未来走向。最后在结论部分简要分析了ISSA的局限,并提出了"信息安全学科与系统科学在认识和理论(即基础科学)层次的融合是从根本上解决信息系统安全问题的主要趋势和有效途径"的观点。 Information Systems Security Architecture (ISSA) has become a crucial branch and research focus of Information Security Science, and one of the key technologies in guiding the R&D of large - scale secure system ( or security products) in the past ten years. The conceptual connotation of "Architecture" and the significance of Security Architecture have been proposed. The variety definition of ISSA is introduced, and its development trace is systematically overviewed. Based on the above, two different research methods and train of thoughts have been revealed. Then, the idea that "ISSA is the positive result of practicing systematic thinking in the Information Security field of investigation" has been clearly proposed. The disciplinary nature, the methodology of ISSA, and the challenges in the development of ISSA in theory, technology, education, practice and application are briefly discussed. Finally, the notion that Each Unification, of the Subjects like Information Security and Science of Systems, started from the basic science, should be the major trend and effective approach to radically solving the problems in Infor- mation Security is proposed.
出处 《空军工程大学学报(自然科学版)》 CSCD 北大核心 2010年第5期75-80,共6页 Journal of Air Force Engineering University(Natural Science Edition)
基金 陕西省自然科学基金资助项目(2007F45) 西安市科技计划资助项目(N7SF019)
关键词 信息系统安全体系结构 信息安全体系结构 系统科学 系统思考 Information System Security Architecture information security architecture science of systems sys- tematic thinking
  • 相关文献

参考文献18

  • 1IEEE STD 1472 -1995. IEEE Standard Glossary of Software Engineering Terminology[ S]. Piscataway, NJ: Institute of Electrical and Electronics Engineers, Inc,1995.
  • 2蒋春芳,岳超源,陈太一.信息系统安全体系结构的有关问题研究[J].计算机工程与应用,2004,40(1):138-140. 被引量:16
  • 3冯登国.国内外信息安全研究现状及发展趋势(摘编)[J].信息网络安全,2007(1):9-11. 被引量:11
  • 4Bell David E, La Padula Leonard J. Secure Computer Systems : A Mathematical Model [ R ]. ESD - TR - 73 - 278,1973.
  • 5Biba K J. Integrity Considerations for Secure Computer Systems[ R]. ESD - TR - 76 - 372,1977.
  • 6Information Processing Systems -OSI RM. ISO/TC97 7498 -2. Part 2: Security Architecture[ S]. Geneva: International Organization for Standardization, 1989.
  • 7This Version April. DoD Technical Architecture Framework for Information Management, Volume 6 : DoD Goal Security Architecture, Defense Information Systems Agency Center for Standards [ EB/OL]. ( 1996 - 4 - 30) [ 2009 - 12 - 22 ]. http ://www. dmff. org/pres/index. html.
  • 8Fine T, Minear S E, Hills Arden. Assuring Distributed Trusted Mach [ C ]//Proceeding of the 1993 Symposium on Security and Privacy. Washinton DC : IEEE Computer Society, 1993:206 - 218.
  • 9Spencer Ray, Smalley Stephen, Loscocco Peter, et al. The Flask Security Architecture : System Support for Diverse Security Policies[ C]//Proceedings of the 8th USENIX Security Symposium. Berkeley, CA:USENTX Association, 1999:123 -139.
  • 10Bender Dan, Moore Reaqan, Marciano Richard, et al. Intelligent Metacomputing Tested ( Distributed Object Computation Tested (DOCT)) [ EB/OL]. (1997 -01 -08 ). http.//handle. dtic. rail/100. 2/ADA324199.

二级参考文献15

  • 1林生.计算机通信与网络教程[M].清华大学出版社,2000..
  • 2[美]BobBlakley.CORBA安全性指南--面向对象系统的安全性[M].北京:人民邮电出版社,2000.11.
  • 3[美]莫瑞.加瑟著.吴亚非译.计算机安全的技术与方法[M].北京:电子工业出版社,1992.04.
  • 4美国家安全局.信息保障技术框架(3.0版)[M].北京:中软电子出版社,2002.04.
  • 5PALMER C R, STEFFAN J G. Generating network topologies that obey power laws[A]. Global Telecommunications Conference, GLOBECOM '00. IEEE[C]. 2000. 434-438.
  • 6ADAMIC L A, HUMBERMAN B, LUKOSE R, PUNIYANI A. Search in power law networks[J]. Physical Review E. 2001, 64(4): 46135- 46143.
  • 7Information Assurance Technical Frame version 3.1, National Security Agency[S]. 2002.
  • 8国家计算机网络与信息安全管理中心翻译.俄罗斯联邦信息安全学说[J].信息网络化发展动态,2002,52(9).
  • 9FANG B X. Architecture for computer emergency response[A]. Proceedings of 2002 Euro-China Co-operation Foum on the Information Society[C]. 2002. 235-238.
  • 10段海新,吴建平.计算机网络安全体系的一种框架结构及其应用[J].计算机工程与应用,2000,36(5):24-27. 被引量:30

共引文献70

同被引文献88

引证文献13

二级引证文献60

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部