期刊文献+

信息系统安全策略研究

下载PDF
导出
摘要 在信息管理系统中,加强安全策略的管理是相当重要的,其承担着信息系统的安全与否。这主要取决于安全策略自身所具有的特点,例如复杂性、繁琐性等特征都决定了要想落实安全策略,就必须要加强对信息系统安全的管理。本文中主要介绍了安全策略在信息系统中的应用,并且介绍了如何能够访问控制策略及其中主要的检查方法,希望在今后的工作中能够得到进一步的完善。
出处 《黑龙江科技信息》 2016年第17期157-157,共1页 Heilongjiang Science and Technology Information
  • 相关文献

参考文献2

二级参考文献10

  • 1ALGIRDAS A Z, JEAN-CLAUDE L, BRIAN R, et al. Basic concepts and taxonomy of dependable and secure computing[J]. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 11-33.
  • 2LOCH K D, CARR H H. Threats to information system security: an organizational perspective[J]. System Sciences, 1991, 4(8-11): 551-557.
  • 3DAN S. Threats to enterprise security[EB/OL]. [2005-04-18]. Http://www. securitydocs.corn/library/321I.
  • 4The President's Critical Infrastructure Protection Board. The national strategy to secure cyberspace for comment (draft)[EB/OL].[2002-09-18]. Http://www.bespacific.com/ mr/archives/000108.htm.
  • 5SABNIS S, CHANDRASHEKHAR U, BASTRY E Challenges of securing an enterprise and meeting regulatory mandates[C]//12th International Telecommunications Net work Strategy and Planning Symposium. [S.l.]: IEEE, 2006: 1-6.
  • 6GUO Jian-dong, QIN Zhi-guang, ZUO Lin. An approach of AIS LAN based on Intel IXP2800[C]//The 2nd International Conference on Embedded Software and Systems. [S.l.]: IEEE, 2005:551-556.
  • 7PONISZEWSKA-MARANDA A. Security constraints in access control of information system using UML language[C]//15th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises. [S.l.]: IEEE, 2006: 332-337.
  • 8PONISZEWSKA-MARANDA A. Role engineering of information system using extended RBAC model[C]//14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise. [S.l.]: IEEE, 2005:154-159.
  • 9BAI Y, KOBAYASHI H. Intrusion detection systems: technology and development[C]//17th International Conference on Advanced Information Networking and Applications. [S.l.]: IEEE, 2003: 710-715.
  • 10郭建东,秦志光,刘乃琦.组织安全保障体系与智能ISMS模型[J].电子科技大学学报,2007,36(5):838-841. 被引量:7

共引文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部