期刊文献+

网络信息系统的可生存性研究 被引量:2

网络信息系统的可生存性研究
下载PDF
导出
摘要 可生存性技术是信息安全领域前沿的研究课题,有着广阔的应用空间,其研究结果可广泛用于安全关键的网络化应用系统及网络基础设施的入侵容忍安全防护中。然而,从其目前国内外研究现状来看,还远未达到实用化的程度。可生存性研究还是一个较有发展潜质的研究领域,首先对可生存性理论进行了系统化的研究与分析,通过分析目前常见网络服务模型的安全局限性,对比可生存性技术和传统网络安全技术,提出一个可生存的网络关键服务模型,并对其架构进行了研究。 survivability technology is cutting-edge research field of information security topics,has a broad application space,and the results can be widely used for security critical applications and network intrusion tolerant network infrastructure security protection.However,research from its current situation at home and abroad,but also far from practical level.Survivability research is a relatively new field of study,the survivability of this first systematic study of theory and analysis,common through the analysis of the current limitations of Web services security model,compared to the survival of traditional network security technologies and technology,presented a key to the survival of the network service model,and its structure analyzed.
作者 吴秋萍
出处 《计算机安全》 2011年第6期20-24,共5页 Network & Computer Security
关键词 网络安全 可生存性 网络信息 network security survivability network information
  • 相关文献

参考文献8

  • 1Kalyoncu, H., Sanltur, B., Estimation of survivability of communication networks, Electronics Letters, Volume 28, Issue 19, IEEE, Sep 1992, pp. 475-480.
  • 2Wu, L., V&rshney, P K., On surviv&bility me&sures fop military networks, Military Communications Conference, A New Era, IEEE, 1990, pp. )25-129.
  • 3Pai, U,, Soh, S., Survivability andlysis of computer-networks withheterogeneous ]ink-c&pacities, Peeliability and Maintainability Symposium,IEEE, 199 440-445. complex Annu&l 1 , pp.
  • 4dire Newport, K.T., Incorporating survivability considerations ctly into the network design process, Ninth Annual Joint Conference of the IEEE Computer and Communication Societies EEE, 1990, pp. 1965--1970.
  • 55GPP TS 23.228: 'IP Wiultimedia Subsystem (IMS), Stage 2.
  • 63GPP TS 24.229: 'Internet Protocol (IP) multimedia c&ll control protocol based on Session Initi&tion Protocol (SIP) and Session Description Protocol (SDP); Stage 3'.
  • 7杨远红,刘飞,王旭,赵彦卓编著.通信网络安全技术.机械工业出版社,2008.
  • 8卢墩.基于可生存性规范的软件构件系统恢复的建模与推理研究.软件学报,2009,:3051-047.

同被引文献4

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部