期刊文献+

可生存性分析方法研究 被引量:7

Research of Survivability's Analysis Method
下载PDF
导出
摘要 系统在受到入侵后依然能够提供必要服务,并在一定时间内恢复受侵害的服务是系统可生存性的本质要求。与传统的将可生存性作为非功能系统属性来描述的方法不同,将可生存性作为系统统一系统功能来研究,并用形式化语言来描述、定义和计算是一种全新的思路和方法。对可生存性分析阶段可以采用的方法进行了深入的研究、分析,其中重点阐述了工作流回溯、攻击树建立等可生存性需求分析的方法,并给出了可生存性量化分析的算法。 Survivability is the ability of a system to fulfill its mission,in a timely manner,in the presence of attacks,failures,or accidents. Survivability is regarded as a system function and being depicted,defined and calculated in formalized languages,different from traditional research of describing survivability as a nonfunctional system property.In this article the methods to analysis survivability is revealed and analysed,emphasising the survivability requirements analysis method such as workflow feedback and attack tree. And a survivability quantification analysis algorithm is given.
出处 《计算机应用研究》 CSCD 北大核心 2002年第12期28-32,共5页 Application Research of Computers
基金 总装备部"十五"预研基金资助项目(418010703)
关键词 可生存性分析方法 计算机网络 网络安全 防火墙 可生存性需求分析 可生存性量化分析 工作流回溯 攻击树 Survivability Requirements Analysis Survivability Quantification Analysis Workflow Feedback Attack Tree
  • 相关文献

参考文献8

  • 1[1]S Muftic, A Patel, et al. Security Architecture for Open Distributed Systems[ C]. John Wiley & Sons, 1993.5-9.
  • 2[2]G Tsudik. Access Control and Policy Enforcement in Internetworks[ C]. Ph. D Dissertation, University of Southern California.April, 1991.2-7.
  • 3[3]David E Ferraiolo, Janet A Cugini, D Richard Kuhn. Role-based Access Control ( RBAC ) : Features and Motivations [C].Proceedings 1 1th Annual Computer Security Application Conference, New Orleans, LA, 1995,7-19.
  • 4[4]National Computer Security Center. A Guide to Understanding Discretionary Access Control in Trusted Systems[S]. 1987.8-27.
  • 5[5]K Sullivan, J Knight, X Du, S Geist. Information Survivability Control Systems [C]. Proceedings: 21st International Conference on Software Engineering, IEEE Computer Society Press, Los alamitos, CA, 1999.40-71.
  • 6[6]Lipson H, Longstaff T. Proceedings of the SEI 1997 Information Survivability Workshop[ C]. San Diego, CA, Feb. 10-13, 1997.Los Alamitos, CA: IEEE Computer Society Press, 1997.
  • 7[7]R C Linger, N R Mead, et al. Requirements Definition for Survivable Network Systems[ EB/OL]. http://www. cmu. edu/.
  • 8[8]Fredrik Moberg. Security Analysis of an Information System Using an Attack Tree-based Methodology [ EB/OL]. http://www.ce. chalmers. se/staff/jonsson/fredrik. moberg-thesis. pdf.

同被引文献45

  • 1黄遵国,卢锡城,胡华平.生存能力技术及其实现案例研究[J].通信学报,2004,25(7):137-145. 被引量:20
  • 2杨超,马建峰.可生存网络系统的形式化定义[J].网络安全技术与应用,2004(7):39-41. 被引量:9
  • 3包秀国,胡铭曾,张宏莉,张绍瑞.两种网络安全管理系统的生存性定量分析方法[J].通信学报,2004,25(9):34-41. 被引量:27
  • 4陈小全,张继红,傅鹂,向宏.基于MA的可生存系统基本服务模型[J].重庆大学学报(自然科学版),2004,27(10):37-39. 被引量:1
  • 5Mamadou H Diallo,Jose Romero-Mariona, Susan Elliott Sim,et al.A comparative evaluation of three approaches to specifying security requirements [Z].http://www.ice.uci,edu/alspaugh/pubs/ alspaugh~resq06.pdf, 2006.
  • 6Andrew P Moore, Robert J Ellison. Panel abstract: Intrusion scenarios for security requirements engineering, institute technical report CMU/SEI-2001-TN-.001 [Z].http://www.sreis.org/old/ 2001/papers/sreis007.pdf.
  • 7John Howard. An analysis of security incidents on the intemet [D]. Carnegie Mellon University, 1997.
  • 8Linger R C,Mead N R, Lipson H F. Requirements definition for survivable network systems[ED/OL]. Carnegie Mellon University, 2000. http://www.cert.org/archive/pdf/icre.pdf.
  • 9[1]Moore A P,R J Ellison,R C Linger.Attack modeling for information security and survivability[R].Software Engineering Institute Technical Report,CMU/SEI-2001
  • 10[2]Anderson R.Why Cryptosystems Fail[C].In:Proc of the 1st Conf on Computer and Communications Security,1993

引证文献7

二级引证文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部