期刊文献+

电子信息系统可信性评估技术研究 被引量:2

Analysis on Dependability Assessment of Electronic Information System
下载PDF
导出
摘要 随着世界科学技术的发展,电子信息系统的应用范围越来越广泛,工业各领域都通过电子信息系统实现了自动化和智能化,近年来发生的棱镜门信息泄露事件、电信金融诈骗事件都说明了电子信息系统可信性的重要性。文章通过对电子信息系统可信性研究,确定了电子信息系统的应用型、可靠性、安全性和可维护性等四项二级指标,并构架了服务完备性、系统故障率等20项三级评价指标;通过对评估方法的研究,形成了建立评估任务、制定评估计划、数据评价、结果分析等四步骤的电子信息系统可信性评估方法。 With the development of world science and technology, application scope of electronic information system becomes more and more widely. Industrial areas realizes the automation and intelligence by the electronic information system. The "PRISM" accident and financial fraud case illustrate the importance of electronic information system crcdibility. This paper indicates the dependability of electronic information system, determines secondary indexes of the application, reliability, security and maintainability of the electronic information system and frames service completeness, system failure rate and other 20 tertiary evaluation indexes. Evaluation task, evaluation plan, data evaluation and analysis of the results of four steps arc established by the study of evaluation methods.
作者 郝文君
出处 《现代工业经济和信息化》 2013年第22期77-79,共3页 Modern Industrial Economy and Informationization
关键词 电子信息系统 可信性 评估 electronic information system dependability assessment
  • 相关文献

参考文献5

  • 1班德米尔;(英)德尔;郑人杰.计算机应用系统的可信性实践[M]{H}北京:清华大学出版社,200323-26.
  • 2林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 3张焕国,毋国庆,覃中平,刘玉珍,刘毅,彭涛,韩永桥.一种新型安全计算机[J].武汉大学学报(理学版),2004,50(A01):1-6. 被引量:21
  • 4何大韧;刘宗华;汪秉宏.复杂系统与复杂网络[M]{H}北京:高等教育出版社,200927-30.
  • 5苗东升.系统科学精要[M]{H}北京:中国人民大学出版社,2006210-215.

二级参考文献17

  • 1林闯,任丰原.可控可信可扩展的新一代互联网[J].软件学报,2004,15(12):1815-1821. 被引量:79
  • 2.中国互联网发展状况统计[EB/OL].http://www.cnnic.net.cn,.
  • 3Algridas A., Laprie J.C., Brian R., Carl L.. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 11~33
  • 4Nicol D.M., Sanders W.H., Trivedi K.S.. Model-based evaluation: From dependability to security. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 48~65
  • 5Paulson L.D.. Stopping intruders outside the gates. IEEE Computer, 2002, 35(11): 20~22
  • 6International Standards Organization. Information Processing Systems-OSIRM. Part2: Security Architecture, ISO/TC 97 7498-2, 1998
  • 7Vaidya N.H.. A case for two-level recovery schemes. IEEE Transactions on Computers, 1998, 47(6): 656
  • 8Avizienis A.. Design of fault-tolerant computers. In: Proceedings of AFIPS Conference, 1967, 31: 733~743
  • 9Michael Atighetchi, Partha Pal et al.. Adaptive cyberdefense for survival and intrusion tolerance. IEEE Internet Computing, 2004, 8(6): 25~33
  • 10Anderson R.J.. Cryptography and competition policy -issues with trusted computing. In: Proceedings of the PODC'03, Boston, Massachusetts, 2003, 13~16

共引文献268

同被引文献3

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部