2Fran Nielsen. Approaches to Security Metrics[ R]. Gaithersburg: NIST,2000.
3ACSA and MITRE Corp. Information system security attribution quantification or ordering[ A] .2001 1^st Workshop on Information System Security Scoring and Ranking Proceedings [ C ]. Virginia: ACSA and MITRE Corp, 2001.1 - 70.
4Bennet S Yee. Security metrology and the monty hall problem[EB/OL].http://ww.cs.ucsd.edu/-bsy/pub/metrology.pdt,2001 -04-02.
5DoD 5200.28-STD, Department of Defense Trusted Computer System Evaluation Criteria[S].
6ISO/IEC 15408, Information Technology-Security Techniques-Evaluation Criteria For IT Security[S].