期刊文献+

内网访问控制策略执行风险度量 被引量:1

Study on Metrics for Risk Implementation of Access Control Strategy in Intranet
原文传递
导出
摘要 VPN网关是众多涉密内网的典型边界防护设备,其网络访问控制策略的执行情况反映了涉密内网安全状况。选取典型的基于VPN网关的涉密内网,研究探讨网络访问控制策略执行过程中的风险度量问题,将安全风险作为一个要素引入网络访问控制策略之中,对策略执行过程中主体、客体和操作等基本信息进行风险分析与度量,从而获得有利于网络访问控制策略动态优化的量化度量结果,改善涉密内网安全状况。 VPN gateway is typical boundary defense equipment in many secret-involved intranets,and the execution of its network access control strategy reflects the security of secret-involved intranets. The typical intranet based on VPN gateway is selected,and the metrics of network access control policy studied. With risk as an important factor of policy,and through quantitative measurement of the basic information such as subject,object and operation the quantitative results beneficial to dynamic optimization of network access control policy are acquired,and the security situation of secret-involved intranet is thus improved.
作者 关慧 郭义喜
出处 《信息安全与通信保密》 2011年第4期61-63,共3页 Information Security and Communications Privacy
关键词 VPN网关 访问控制 风险 度量 VPN gateway access control risk metrics
  • 相关文献

参考文献7

二级参考文献34

  • 1晏华辉,崔晋川.基于AHP与DEA的多因素排序法[J].系统工程学报,2004,19(5):543-547. 被引量:21
  • 2李汶华,郭均鹏.AHP中判断矩阵的区间权重及其一致性检验[J].系统工程理论方法应用,2004,13(6):530-532. 被引量:12
  • 3ISO/IEC. ISO/IEC FDIS 27001: 2005. Information Technology-Security Techniques-Information Security Management Systems-Requirements[S]. Geneva: ISO/IEC, 2005.
  • 4Oltsik J. The SIEM Architecture[EB/OL]. (2007) [2008-6-1]. http: //whitepapers.techrepublic. com.com/abstract.aspx?docid=878467&promo= 100511.
  • 5Yahya Mehdizadeh. IT Security Event Management[EB/OL]. (2004)[2008-6-1]. http: //www. infosecwriters.com/.
  • 6中国国家标准化管理委员会.GB/T20984-2007:信息安全技术信息安全风险评估规范[S].北京:中国标准出版社,2007.
  • 7Alberts C J, Dorofee A J. OCTAVE Criteria Version 2.0[R]. Hanscom: Carnegie Mellon University, 2001.
  • 8Michael Greenwald. Computer security is not a science (but itshould be)[ A]. In Proceedings of the Large-Scale Network Security Workshop[ C ]. Landsdowne, VA, March 2003 : 24 - 27.
  • 9GB/T 18336,信息技术安全性评估准则[S].
  • 10ISO 18045, Common Evaluation Methodology[ S ].

共引文献8

同被引文献8

  • 1MITOLA J, MAGUIRE G Q. Cognitive Radio: Making Software Radios More Personal[J]. IEEE Personal Communications, 1999, 6(4): 13-18.
  • 2THOMAS R W, DASILVA L A, MACKENZIE A B. Cognitive Networks[J]. Proc of IEEE DySPAN, 2005, 2(3): 352-360.
  • 3THOMAS R W. Cognitive Networks: Adaptation and Learning to Achieve End-to-end Performance Objectives[J]. IEEE Communizations Magazine, 2006, 44(12) : 51-57.
  • 43GPP TS 23.228-V 10.0.0-2011, IP Multimedia Subsystem(IMS) ; stage2[S].
  • 5IEEE 1900.4-2009, IEEE Standard for Architectural Building Blocks Enabling Network-Device Distributed Decision Making for Optimized Radio Resource Usage in Heterogeneous Wireless Access Networks[S].
  • 6STEVENSON Carl R, CHOUINARDM G, LEI Zhongding. IEEE 802.22: The First Cognitive Radio Wireless Regional Area Network Standard[J]. IEEE Communications Magazine, 2009, 47(1): 130-138.
  • 7于广威,何文才.基于RFID技术的身份识别系统设计与实现[J].通信技术,2010,43(4):106-108. 被引量:11
  • 8唐林,刘尚麟.网电空间心理战装备发展研究[J].信息安全与通信保密,2012,10(12):65-67. 被引量:2

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部