期刊文献+

基于GB/T 20274的信息系统安全技术保障评估及计算机实现 被引量:1

GB/T 20274-Based Information System Security Technical Assurance Evaluation and Computer Realization
下载PDF
导出
摘要 国家标准GB/T 20274定义了信息系统的安全技术保障要素集,并建议以能力成熟度等级的形式度量信息系统的安全技术保障性。本文首先对安全技术保障度量的能力成熟度等级进行量化处理;其次将信息系统组件的安全技术保障性表示成向量的形式,在向量和向量∞-范数的基础上重新阐述了信息系统的安全技术保障模型;最后,给出了信息系统的安全技术保障的计算机实现算法。仿真实验结果验证了本文算法能有效地实现信息系统的安全技术保障的评估。 National criteria GB/T 20274 defines the set of security technical assurance elements for the evaluation of information system security technical assurance, and provides security technical assurance metrics with different levels of capability maturity model. This paper firstly quantifies the security technical assurance metric levels, and then restates information system security technical assurance with the use of mathematical concepts, such as vector and vector infinity norm, and finally develops an effective algorithm for evaluating capability maturity levels of information systems in security technical assurance. The simulation shows that the proposed algorithm can effectively realize the security technical assurance evaluation of information systems.
出处 《华东理工大学学报(自然科学版)》 CAS CSCD 北大核心 2012年第5期645-651,共7页 Journal of East China University of Science and Technology
关键词 安全技术保障要素 安全技术保障度量 保障评估模型 保障评估算法 security technical assurance elements security technical assurance metrics assuranceevaluation model assurance evaluation algorithm
  • 相关文献

参考文献7

  • 1XIE Cheng-shan,XUJIA Gu-yue,WANG Li.Information security assurance lifecycle research[J].The Journal of China Universities of Posts and Telecommunications,2007,14(4):77-81. 被引量:3
  • 2ISO. ISO/IEC 15408 Information Technology-Security Tech niques-Evaluation Criteria for 1T Security[S]. USA: ISO, 2005.
  • 3Fran Nielsen. Approaches to security metrics[R]. Gaithers- burg: NIST, 2000.
  • 4ACSA and MITRE Corp. Information system security attribu tion quantification or ordering [C]// First Workshop on Infor mation System Security Scoring and Ranking Proceedings. Vir- ginia: ACSA and MITRE Corp. , 2001: 1 -70.
  • 5GB/T20274,信息安全技术信息系统安全保障评估框架[S].2006.
  • 6闫强,陈钟,段云所,王立福.信息系统安全度量与评估模型[J].电子学报,2003,31(9):1351-1355. 被引量:31
  • 7Paulk M C, Weber C V, Curtis B, et al. The Capability Maturity Model: Guidelines for Improving the Software Process[M]. Boston: Addison Wesley, 1995.

二级参考文献9

  • 1粟湘,郑建明,吴沛.信息生命周期管理研究[J].情报科学,2006,24(5):691-696. 被引量:57
  • 2.GB 17859-1999.计算机信息系统安全保护等级划分准则[S].,1999..
  • 3Fran Nielsen. Approaches to Security Metrics[ R]. Gaithersburg: NIST,2000.
  • 4ACSA and MITRE Corp. Information system security attribution quantification or ordering[ A] .2001 1^st Workshop on Information System Security Scoring and Ranking Proceedings [ C ]. Virginia: ACSA and MITRE Corp, 2001.1 - 70.
  • 5Bennet S Yee. Security metrology and the monty hall problem[EB/OL].http://ww.cs.ucsd.edu/-bsy/pub/metrology.pdt,2001 -04-02.
  • 6DoD 5200.28-STD, Department of Defense Trusted Computer System Evaluation Criteria[S].
  • 7ISO/IEC 15408, Information Technology-Security Techniques-Evaluation Criteria For IT Security[S].
  • 8GB17859—1999.计算机信息系统安全保护等级划分准则[S].[S].,..
  • 9陈兵,王立松.网络安全体系结构研究[J].计算机工程与应用,2002,38(7):138-140. 被引量:48

共引文献31

同被引文献11

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部