2U.S. House of Representatives. Investigative Report on the U. S. National Security Issues Posed by Chinese Tel ecommunieations Companies H uawei and ZTE[R]. 112th Congress, 2012;5.
3GAO. information security: Cyber Threats and Vulnerabilities Place Federal Systems at RiskeRS. GAO-09- 661T, 2009 : 2.
4Scott Charney, Eric T. Werner. Cyber Supply Chain Risk Management: Toward a Global Vision of Transparency and Trust[R]. Microsoft,2011:1.
5John Rollins, Anna C. Henning. Comprehensive National Cyber Security Initiative: Legal Authorities and policy Considerations[R]. Congressional Research Service, 2009 : 5.
6GAO. IT Supply Chain National Security-Related Agencies Need to Better Address Risks[R]. USA, 2012:6.
7Helen Peck. Drivers of supply chain vulnerability: an integrated framework[J]. International Journal of Physical Distribution & Logistics Management, 2005, (4).
8GAO. IT supply chain:National Security-Related Agencies Need to Better Address Risks[R]. USA,2012:5.
9National policy on certification and accreditation of national security telecommunications and information sys- tems,NSTISSP No. 6,1994.
10National Information Assurance Certification and Accreditation Process (NIACAP). NSTISSI No. 1000,2000.