期刊文献+

计算机网络防御策略模型 被引量:2

下载PDF
导出
摘要 近年来,黑客攻击等网络安全事件频繁发生引起人们对计算机网络安全的关注,网络安全问题逐渐从一项社会课题发展为一门科学。计算机网络防御策略模型独辟蹊径,打造专有的以"策略"为中心的防御措施,让计算机网络在阳光下安全运行。文章系统分析了计算机网络面临安全危机以及计算机防御策略模型的概况,独具研究价值。
作者 孟繁华
出处 《信息通信》 2014年第4期160-160,共1页 Information & Communications
  • 相关文献

参考文献2

二级参考文献18

  • 1Sloman M S. Policy driven management for distributed systems [J]. Journal of Network and Systems Management, 1994, 2 (4) :333 -360
  • 2Stern D F. On the buzzword " security policy" [ C ]//Security and Privacy. Los Alamitors:IEEE CS Press, 1991:219 -230
  • 3Zhang Feng, Qin Zhiguang, Zhou Shijie. Policy-tree based proactive defense model for network security [ C ]//Grid and Cooperative Computing. Berlin : Springer, 2004, 3252:437 - 439
  • 4Moffett J D, Sloman M S. Policy hierarchies for distributed systems management [ J]. IEEE JSAC Special Issue on Network Management, 1993, 11(9): 1404-1414
  • 5Wies R. Using a classification of management policies for policy specification and policy transformation [ C ]//Integrated Network Management. London : Chapman Hill, 1995:44 - 56
  • 6Katri Ylitalo. Policy core information model[ EB/OL]. 2000. http://www. cs. helsinki. fi/u/kraatika/Courses/QoS00a/ylitalo. pdf
  • 7Kim S Y, Kim M E, Kim K, et al. Information model for policybased network security management [ C ]// Wired Communications and Management. Berlin:Springer, 2002, 2343: 662- 672
  • 8Tang Chenghua, Yao Shuping, Cui Zhongjie, et al. A network security policy model and its realization mechanism [ C ] //Information Security and Cryptology. Berlin: Springer, 2006,4318: 168 - 181
  • 9Bartal Y, Mayer A J, Nissim K, et al. Firmato: a novel firewall management toolkit [ J]. ACM Transactions on Computer Systems, 2004, 22(4) :381 -420
  • 10Luck I, Schafer C, Krumm H. Model-based tool assistance for packet-filter design [ C ]// Policies for Distributed Systems and Networks. Berlin : Springer, 2001 : 120 - 136

共引文献21

同被引文献5

引证文献2

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部