期刊文献+

模糊评价在信息系统安全综合评测中的应用

Fuzzy Evaluation in the Comprehensive Review of the Information Systems Security
下载PDF
导出
摘要 随着我国信息化的快速发展,信息安全变的越来越重要,信息安全等级保护、信息安全风险评估和安全检查作为我国信息安全保障的重要手段和制度越来越被政府和各行各业重视.笔者通过积累多年的信息安全测评经验,以及结合金融行业和国税总局等多个全国联网大系统的风险评估、等级保护测评和安全检查三项整合工作的经验总结,提出在信息系统信息安全三合一整合的综合信息安全测评中采用基于模糊综合评价方法论,进行信息安全的综合评价具有实际的可操作性和指导意义. With the rapid development of Chinese information technology, information security becomes more and more important, the information level of security protection, risk assessment and security check as an important means of information security in China. Through the accumulation of years of information security evaluation experience, we combined with the risk assessment of the financial industry and the State Administration of Taxation of the national network system, grade protection evaluation and security check of three integrated work experience presented in the triple integration of information systems Information Security Information Security Evaluation, which operability and guidance based on fuzzy comprehensive evaluation methodology. Then we get fuzzy evaluation information security model.
出处 《计算机系统应用》 2012年第11期7-10,160,共5页 Computer Systems & Applications
关键词 信息安全 风险评估 安全等级保护 安全检查 模糊综合评价 information security risk assessment level of security protection security check fuzzy comprehensive evaluation
  • 相关文献

参考文献5

二级参考文献14

  • 1王雪青,尹志健.工程项目投标报价策略及利润率模型[J].重庆建筑大学学报,2001,23(z1):61-65. 被引量:4
  • 2Wang J, Sun H J. A new evidential trust model for open cornmunities[J]. Journal of Computer Standards & Interfaces, 2009,31 (5):994-1001.
  • 3Yu B, Singh M P. An evidential model of distributed reputation management[C]//Proceedings of 1st International Joint Conference on Automous Agents and Multi-Agents Systems (AAMAS'02). Bologna, Italy, 2002.
  • 4Josang A, Pope S. Semantic Constraints for Trust Transitivity [C] // Proceedings of the 2nd Asia-Pacific Conference on Con- ceptual Modeling. Australia, 2005.
  • 5Xie Z,Geng Y, Bi J. STTM: Similarity Transitivity Chain Based Trust Model in P2P Environrnent[C]//Proceedings of IEEE International Conference on Communications (IC122010). South Africa,2010.
  • 6Ziegler C, Lausen G. Propagation Models for Trust and Distrust in Social Networks [J ]. Information Systems Frontiers, 2005,7 (4/5) : 337-358.
  • 7Page L, Brin S, Motwani R, et al. The PageRank Citation Ranking: Bringing Order to the Web[R-. Stanford Digital Library Technologies Project. 1998.
  • 8Golbeck J A. Computing and Applying Trust in Web-based Social Networks[D]. Dissertation University of Maryland-College Park, 2005.
  • 9Yu B, Singh M P. An evidential model of distributed reputation management[C]//Proceedings of 1st International Joint Conference on Automous Agents and Multi-Agents Systems (AAMAS'02). Bologna, Italy,2002.
  • 10张明武,杨波,禹勇.基于D-S理论的分布式信任模型[J].武汉大学学报(理学版),2009,55(1):41-44. 被引量:8

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部