期刊文献+

浅谈网络信息的安全措施 被引量:1

下载PDF
导出
摘要 在网络日益普及的今天,网络信息安全问题已成为全球性的问题,信息安全的重要性越来越受到人们的重视。各国相继出台了保护信息安全的技术及法规,以确保网络信息的安全性。
作者 焦俊梅
机构地区 韶关学院图书馆
出处 《中山大学学报论丛》 2003年第5期82-83,共2页 Supplement to the Journal of Sun Yatsen University
  • 相关文献

参考文献5

二级参考文献29

共引文献140

同被引文献22

  • 1U Leonhardt,J Magee. Security considerations for a distributed location service[J]. Journal of Network and Systems Man-agement, 1998,6( 1 ) : 51-70.
  • 2J H Sahzer, M D Schroeder. The protection of information in computer systems[J]. Proceedings of the IEEE, 1975,63(9): 1278-1308.
  • 3Personal Firewalls:What are they, how do they work? SANS Institute, 2000.
  • 4Gary N Stone, Bert Lundy, Geoffrey G Xie. Network Policy Languages: A survey and a new approach. IEEE Network, 2001.
  • 5G Denker, J Millen, Y Miyake. PKI and revoeation survey [J].Computer Science Laboratory, 2000.
  • 6J Barkley, A CinCotta, D Ferraiolo, S Gavrilla, et al. Role-based access control for the world wide web[D]. Proceedings of The 20th National Information System Security Conference, 1997.
  • 7R S Sandhu, Edwoard J Coyne, Hal L Feinstein. Role-based access control models[J]. IEEE Computer, 1996,29(2):38-47.
  • 8David F Ferraiolo, Ravi S Sandhu. Proposed NIST standard for role-based access control[J]. ACM Transactions on Information and Systems Security, 2001, (3):224-274.
  • 9T Jaeger,A Prakash. Implementation of a discretionary access control model for script-based systems[D]. Proceedings of The 8th IEEE Computer Security Foundation Workshop,County Kerry,Ireland, June 1995:70-84.
  • 10刘怀宇,李伟琴.浅谈访问控制技术[J].电子展望与决策,1999(1):42-46. 被引量:14

引证文献1

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部