期刊文献+

信息安全等级保护制度在计算机网络搭建中的应用 被引量:6

Application of Information Security Level Protection System in Computer Network Construction
下载PDF
导出
摘要 信息安全等级保护制度被确定为中国执行信息安全保护的一项根本制度,并在全国范围内快速落实。国家机关部门利用信息安全等级保护管理出台了一系列措施与政策。基于此,提出信息安全等级保护制度在计算机网络搭建中的应用,具体包括控制计算机网络访问的设立边界、编码计算机网络安全标记等级、提高计算机网络储存数据保密性。 The information security hierarchical protection system has been identified as a fundamental system for China to implement information security protection,and has been implemented rapidly throughout the country.A series of measures and policies have been put forward by state organs and departments using information security hierarchical protection management.Based on this,this paper puts forward the application of information security hierarchical protection system in computer network construction,including the establishment of boundaries to control computer network access,the coding of computer network security label level,and the improvement of computer network storage data confidentiality.
作者 贾觐 Jia Jin(Henan University of Economics and Law,Zhengzhou Henan 450000,China)
出处 《信息与电脑》 2019年第12期203-204,共2页 Information & Computer
关键词 信息安全 等级保护制度 计算机网络 information security hierarchical protection system computer network
  • 相关文献

参考文献5

二级参考文献51

  • 1蔡谊,郑志蓉,沈昌祥.基于多级安全策略的二维标识模型[J].计算机学报,2004,27(5):619-624. 被引量:28
  • 2季庆光,卿斯汉,贺也平.一个改进的可动态调节的机密性策略模型[J].软件学报,2004,15(10):1547-1557. 被引量:33
  • 3郑志蓉,蔡谊,沈昌祥.操作系统安全结构框架中应用类通信安全模型的研究[J].计算机研究与发展,2005,42(2):322-328. 被引量:6
  • 4Bell D E,La Padula L J.Secure computer system:unified exposition and MUTICS interpretation.MTR-2997,AD-A 023 588,July 1975.
  • 5Biba K J.Integrity considerations for secure computer system,ESD- 76-372[R].Bedford.MA:PSAF Electronic System Division,Hanscom Air Force Base, 1977.
  • 6Waldhart N A.The army secure operating system[C]//IEEE Computer Society Symposium on Resarch in Security and Privacy,1990:50-60.
  • 7Ott A. Regel-Basierte zugriffskontrolle nach dem Generalized framework for access controlansatz am beispiel Linux. Diplomarbeit Universitat Hamburg, 1997.
  • 8Shi WC. Research on and enforcement of methods of secure operating systems development. [Ph.D. Thesis] Beijing: Institute of Software, The Chinese Academy of Sciences, 2001 (in Chinese with English abstract).
  • 9Mayer FL. An interpretation of refined Bell-LaPadula model for the TMach kernel. In: Proc. of the 4th Aerospace Computer Security Applications Conf. IEEE Computer Society Press, 1988. 368-378.
  • 10Lunt T, Denning D, Schell R, Heckman M, Shockley W. The SeaView security model. IEEE Trans. on Software Engineering,1990,16(6):593-607.

共引文献57

同被引文献34

引证文献6

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部