2[1]Saaty T L. The Analysis Hierarchy Process[M].Mc Graw Hill Inc, 1980.
3[2]NIST Special Publication 800-30[Z].NIST,2001.
4[5]Fites P E,Kratz M P, Brebner A F.Control and Security of Security of Computer Information Systems[M].Rockville,MD, Computer Science Press Inc.,1989.
6[7]Thomas R, Peltier. Information Security Risk Analysis[M].Rothstein Associates Inc.,2001.
7J.A.Richards.Inspection,Maintenance and Repair of Tunnels:International Lessons and Practice[J].Tunneling and Underground Space Technology, 1998,13:369-375.
8VCarr,J.H.M.Tah.A Fuzzy Approach to Construction Proect Risk Assessment and Analysis:Construction Proiect Risk Management System[J].Advances in Engineering Software,2001,32:845-857.