期刊文献+

面向漏洞管理的工作流技术应用研究 被引量:8

Research on Workflow Technology for Vulnerability Management
下载PDF
导出
摘要 随着网络安全漏洞威胁日益加深,网络空间安全形势愈加严峻,掌控漏洞威胁信息、负责漏洞风险管理的漏洞管理机构发挥着越来越重要的作用,对漏洞数据的制度化、规范化、流程化管理是有效开展漏洞威胁消控的重要基石.研究了目前管理机制较为完善的漏洞管理机构,提出了一套普适性的漏洞管理流程,并结合工作流技术进行业务建模和系统实现.实践表明,将工作流技术应用于漏洞管理工作中,可以协助漏洞管理机构提高漏洞管理效率,有效开展漏洞威胁消控工作. With the growing threat of network vulnerability,cyberspace is confronted with numerous dangers and the vulnerability management agencies play an increasingly significant role therefore.Vulnerability management is supposed to be institutionalized,standardized,and streamlined,which is an indispensable cornerstone for effectively reducing vulnerability risk.To improve the efficiency of vulnerability management,general vulnerability management processes were proposed,and a workflow technology was used to model and run these processes.BPMN(business process model and notation)was used to model the management processes and a workflow management system was built to run them.Practices show that,the workflow technology based vulnerability management can improve the efficiency of vulnerability management and effectively remove and control the vulnerability threat.
作者 杨诗雨 苏丽丽 侯元伟 郝永乐 李伟平 YANG Shi-yu;SU Li-li;HOU Yuan-wei;HAO Yong-le;LI Wei-ping(China Information Technology Security Evaluation Center,Beijing 100085,China;School of Software and Microelectronics,Peking University,Beijing 100871,China)
出处 《北京理工大学学报》 EI CAS CSCD 北大核心 2019年第9期967-973,共7页 Transactions of Beijing Institute of Technology
关键词 漏洞管理 工作流 工作流建模 vulnerability management workflow workflow modeling
  • 相关文献

参考文献3

二级参考文献24

  • 1AX沙瓦耶夫著.国家安全新论[M].北京:军事友谊出版社,2002..
  • 2王越.以科学的态度正确对待信息安全问题[J].网络安全技术及应用[J],2003,36(12).
  • 3Du Weimin,Technical Report,HPL - 1999-8,HP L aboratories Palo Alto,1999年
  • 4Du Weimin,Proceedings of the NATO Advanced Study Institute on Workflow Management Systems,1998年
  • 5Cai Ting,TechnicalReport,PCS- TR96 - 2 83,Dartmouth College,1996年
  • 6Pu C,Proceedings of the 14th International Conference on Very L arge Databases,1987年,26页
  • 7王智远 等.联合信息作战[M].北京:军事谊文出版社,1999..
  • 8成思危.复杂性科学探索[M].北京:民主与建设出版社,1999.156-158.
  • 9王寿云 于景元.开放复杂巨系统[M].杭州:浙江教育出版社,1996.247.
  • 10Mouna Tka,Sonia Ayachi Ghannouchi.Comparison of Business Process Models as Part of BPR Projects[J].Procedia Technology.2012

共引文献524

同被引文献83

引证文献8

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部