期刊文献+

二次系统安全体系结构化设计方法 被引量:47

A METHOD FOR THE STRUCTURED SECURITY ARCHITECTURE DESIGN OF SECONDARY SYSTEMS
下载PDF
导出
摘要 在二次系统安全体系设计工作经验的基础上 ,借鉴DGSA模型和MOAT方法的优点 ,利用面向对象的分析建模技术 ,提出了一种安全体系结构化设计方法。该方法在建立二次系统抽象模型的基础上进行安全风险分析和安全措施配置 ,目的是促进安全工作组之间的交流 ,保证对大系统进行安全体系设计的质量。因为该方法主要基于面向对象分析建模技术 ,而目前面向对象的辅助分析建模工具已经比较成熟 。 Based on the experience in the security architecture design of secondary systems, this paper presents a method for structured security architecture design, which draws on the advantages of DGSA and MOAT and makes good use of object oriented analysis and modeling techniques. The method begins with establishing an abstract model for a secondary system, and then performs the security risk analysis and countermeasure configuration, the purpose being to facilitate the communications among security work teams and ensure the quality of security architecture design for large systems. Since it is mainly based on the object oriented analysis and modeling techniques supported by fairly good tools, it provides the possibility for the automation of security architecture design.
出处 《电力系统自动化》 EI CSCD 北大核心 2003年第21期63-68,共6页 Automation of Electric Power Systems
关键词 计算机系统安全与保密 电力系统调度自动化 结构化设计方法 DGSA模型 MOAT方法 security and secrecy of computer system dispatching automation of electric power systems structured design method DGSA MOAT
  • 相关文献

参考文献10

  • 1段海新,吴建平.计算机网络的一种实体安全体系结构[J].计算机学报,2001,24(8):853-859. 被引量:28
  • 2沈昌祥.用信息安全工程理论规范信息安全建设[J].计算机世界,2001,(34):01-01.
  • 3马东平.设计企业信息系统的安全体系[J].计算机世界,2001,(34):08-08.
  • 4DoD. Information Assurance Technical Framework V 3. 0.http://www. iatf. net, 1996.
  • 5SSE-CMM Project. Systems Security Engineering Capability Maturity Model Version 2.0. http://www. sse-cmm. org, 1999-04-01.
  • 6Herrmann P, Krumm H. Object-oriented Security Analysis and Modeling. In: Proc 9th International Conference on Telecommunication Systems— Modeling and Analysis. Dallas(US): 2001. 21-32.
  • 7Lowman T, Mosier D. Applying the DoD Goal Security Architecture as a Methodology for the Development of System and Enterprise Security Architectures. New York: IEEE, 1997.
  • 8ISO/IEC TR 13335-5. Information Technology — Guidelines for the Management of IT Security, Part 5: Management Guidance on Network Security (First Edition). 2001.
  • 9Kienzle D M. Practical Computer Security Analysis (Thesis).Charlottesville: University of Virginia, 1998.
  • 10ISO/IEC 15408-2. Information Technology — Security Techniques Evaluation Criteria for IT Security, Part 2:Security Functions Requirements (First Edition). 1999.

二级参考文献8

  • 1Muftic S,Sloman M.Security architecture for distributed systems[].Computer Communications.1994
  • 2Nesset D.Factors affecting distributed system security[].IEEE Transactions on Software Engineering.1987
  • 3John McLean.Reasoning about security policy[].In: IEEE Computer Society Symposium on Research in Security and Privacy.1990
  • 4Anthony Boswell.Specification and validation of a security policy model[].IEEE Transactions on Software Engineering.1995
  • 5Daniel FSterne.On the buzzword ‘security policy’[].Proc Symposium on Research in Security and Privacy IEEE.1991
  • 6International Standards Organization.Information processing Systems-OSI RM[]..1988
  • 7National Computer Security Center Department of Defense Trusted Computer System Evaluation Criteria. DOD 5200 28-STD . 1985
  • 8Defense Information Systems Agency.Do D TechnicalArchitecture Framework for Inform ation Management,Volum e6 :Do D Goal Security Architecture. http:/ / www.dmtf.org/ pres/ index.html . 1996

共引文献27

同被引文献280

引证文献47

二级引证文献528

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部