期刊文献+

信息安全评估算法研究 被引量:3

Research on Information Security Evaluation Algorithm
下载PDF
导出
摘要 针对目前各企业在网络信息安全测评中采用的对核查结果统计处理算法中的缺点,通过对计算机安全特点的研究,对比通常采用的加权算术平均法中权数的选取,本文提出采用多元线性回归算法求解加权算术平均法中的权数。该算法可以在使用的过程中减少人为因素对评估结果的影响,提高评估结果的可信度。 Due to the weak point of the statistical processing algorithm used in network information security evaluation,base on the characteristics of computer security,this article proposes the multivariate linear regression algorithm to obtain weight number contrast the way often used in selecting weight number of the weighted arithmetic mean.This algorithm can reduce the affection of human on the evaluation result,and improve the credibility of the evaluation result.
作者 张恒双
出处 《计算机与现代化》 2011年第4期42-44,共3页 Computer and Modernization
关键词 多元线性回归 信息安全评估 计算机安全 multiple linear regression information security evaluation computer security
  • 相关文献

参考文献11

  • 1GB/T2J028-2007,信息安全技术服务器安全技术要求[S].
  • 2GB/T20008.2005,信息安全技术操作系统安个坪估准则[S].
  • 3林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 4张鑫,顾庆,陈道蓄.面向对比评估的软件系统安全度量研究[J].计算机科学,2009,36(9):122-126. 被引量:6
  • 5Longley D,Shain M,Caelli W. hfformation Security: Dictionary of Concepts,Standards and Terms [ M ]. New York, USA, 1992.
  • 6张涛,胡铭曾,云晓春,张永铮.计算机网络安全性分析建模研究[J].通信学报,2005,26(12):100-109. 被引量:41
  • 7Bertino E, Khan L R, sandhu R, et al. Secure knowledge management : Confidentiality, trust, and privacy [ J ]. IEEETransactions on Svstems,Man,and Cvbernetics Part A Systems and Humans, 2006,36 ( 3 ) :429-438.
  • 8Balthrop J,Eorresl S,Newman M E J,et al Technological networks and the spread of computer viruses[J].Scicnce,2004,304(5670):527-529.
  • 9Datta S, Wang H.The effectiveness of vaccinations on the spread of email-bome computer viruses [ C]//IEEE CCECE/ CCGEI. 2005:219-223.
  • 10Kephart Jeffrey O,Sorkin Gregory. B,Chess David M,et al. Fighting computer viruses [ J ]. Scientific American, 1997, 277 ( 5 ) : 88-93.

二级参考文献91

  • 1林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:252
  • 2王涛,郭荷清,姚松涛.基于综合安全保护质量的安全服务协商模型[J].计算机工程与科学,2006,28(4):26-29. 被引量:1
  • 3Howard M,Pincus J,Wing J M.Measuring relative attack surfaces[C]//Proc,of Workshop on Advanced Developments in Software and Systems Security.Taipei,2003.
  • 4Manadhata P,Wing J M.Measuring a system's attack surface[R].CMU-CS-04-102.Computer Science Department of Camegie Mellon University,2004.
  • 5Manadhata P,Wing J M.An attack surface metric[R].CMUCS-05-155.Computer Science Department of Carnegie Mellon University,2005.
  • 6Manadhata P,Wing J,Flynn M,et al.Measuring the attack surfaces of two FTP daemons[C]//Proceedings of the 2nd ACM Φorkahop on Quality of Protection.Alexandria VA,USA,2006.
  • 7Manadhata P,Kaynar D K,Wing J M.A formal model for a system's attack surface[R].CMU-CS-07-144.Computer Science Department of Carnegie Mellon University,2007.
  • 8Mirkovic J,Reiher P,Fahmy S,et al.Measuring Denial of Service[C]//Proceedings of the 2nd ACM Workshop on Quality of Protection.Alexandria VA,USA,2006.
  • 9Pamula J,Jajodia S,Ammann P,et al.A Weakest-adversary Security Metric for Network Configuration Security Analysis[C]//Proceedings of the 2nd ACM Workshop on Quality of Protection.Alexandria VA,USA,2006.
  • 10Wang Lingyu,Singhal P A,Jajodia P S.Toward measuring network security using attack graphs[C]//Proceedings of the 2nd ACM Workshop on Quality of Protection.Alexandria VA,USA,2007.

共引文献135

同被引文献17

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部