期刊文献+

基于主机安全组划分的网络安全性研究 被引量:1

下载PDF
导出
摘要 科学技术的飞速发展和网络信息的不断进步为人们的工作、学习和日常生活都提供了极大的便利。但与此同时,也开始频繁发生个人信息被泄露的状况,使得人们对于网络安全问题的关注度越来越高。本文当中首先简要说明计算机网络安全性当中切实存在的问题,在此基础之上重点探讨基于主机安全组划分的网络安全性,以期对计算机安全的巩固有所裨益。
作者 杨宇
出处 《信息技术与信息化》 2014年第5期113-114,共2页 Information Technology and Informatization
  • 相关文献

参考文献2

二级参考文献17

  • 1张永铮,云晓春,胡铭曾.基于特权提升的多维量化属性弱点分类法的研究[J].通信学报,2004,25(7):107-114. 被引量:35
  • 2PHILLIPS C, SWILER L E A graph-based system for network vulnerability analysis[A]. Proc 1998 Workshop on New Security Paradigms[C]. Virginia, USA, 1998.71-79.
  • 3RITCHEY R W, AMMANN E Using model checking to analyze network vulnerabilities[A]. Proc 2001 IEEE Symposium on Security and Privacy[C]. Oakland, California, USA, 2001.156-165.
  • 4SHEYNER O, HAINES J, JHA S. Automated generation and analysis of attack graphs[A]. Proc 2002 IEEE Symposium on Security and Privacy[C]. Oakland, California, USA, 2002.254-265
  • 5AMMANN P, WIJESEKERA D, KAUSHIK S. Scalable, graph-based network vulnerability analysis[A]. Proc the 9th ACM Conference on Computer and Communications Security[C]. Washington, DC, USA, 2002.217-224.
  • 6SHAHRIARI H R, JALILI R. Modeling and analyzing network vulnerabilities via a logic-based approach[A]. Proc the 2nd International Symposium of Telecommunications (IST2005)[C]. Shiraz, Iran, 2005.13-21.
  • 7Qu X, BOYER W F, MCQUEEN M A. A scalable approach to attack graph generation[A]. Proc the 13th ACM Conference on Computer and Communications Security(CCS'06)[C]. Alexandria, Virginia, USA, 2006.336-345.
  • 8NOEL S, JACOBS M, KALAPA P. Multiple coordinated views for network attack graphs[A]. Proc 2005 Workshop on Visualization for Computer Security[C]. Minneapolis, USA, 2005.99-106.
  • 9LI W, VAUGHN R B. Cluster security research involving the modeling of network exploitations using exploitation graphs[A]. Proc of the 6th IEEE International Symposium on Cluster Computing and the Grid Workshops(CCGRIDW'06)[C]. Singapore, 2006.26-37.
  • 10DAWKINS J, HALE J. A systematic approach to multi-stage network attack analysis[A]. Proc of the Second IEEE International Information Assurance Workshop (IWIA'04)[C]. Charlotte, NC, USA, 2004.48-54.

共引文献28

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部