Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Engineering and Design》 2005-01
Add to Favorite Get Latest Update

Object oriented security evaluation method

LI Xiao-man, JIANG Jian-chun, QING Si-han (Engineering Research Center for Information Security Technology, Chinese Academy of Sciences, Beijing 100080, China)  
A novel approach to the security evaluation of information system is presented. Due to the absence of evaluation theory, most of the security evaluation is informal, random, and low efficient in practice. The organization need standards to regulate their evalutaion for the huge information system and network. Based on the model of object oriented security description (OOSD), a formal, open and clear framework for security evaluation is given.
【CateGory Index】: TP309
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 2 Hits
1 SHI Yun-hui(Dept.of Computer Science,Qiannan Normal College for Nationalities,Duyun 558000,China);Discussions on the Technology of Data Safety in the Construction of Campus Network[J];Journal of Qiannan Normal College for Nationalities;2007-06
2 YIN Ding-yuan,GAO Jian-hua(Department of Computer Science and Engineering,College of Mathematics and Science,Shanghai Normal University,Shanghai 200234,China);Visitor design pattern in software refactoring and application[J];Computer Engineering and Design;2006-24
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 WANG Guang-qiong(Computer Science, Dept of Daxian Teachers College, Dazhou 635000, China);Study On GFAC Based Synthesize Access Control[J];Journal of Anqing Teachers College(Natural Science Edition);2004-04
2 XU Jie-feng (Information Center of Shengli Oil Field, Shandong 257001, China);The Research of Covert Channels Based on TCP/IP[J];Journal of Beijing University of Posts and Telecommunications;2003-S1
3 XING Dong-xu,HEI Jian-xin (Network Center,UST Inner Mongolia,Baotou 014010,China);Analysis of security model on Linux[J];Journal of Baotou University of Iron and Steel Technology;2004-01
4 YAN Qiang,CHEN Zhong,DUAN Yun suo,WANG Li fu (Dept.of Computer Science & Technology,Peking University,Beijing 100871,China);Information System Security Metrics and Evaluation Model[J];Acta Electronica Sinica;2003-09
5 WANG Ze-yan, WANG Chun-xia, ZHANG Jin-hui (Institute of Science, PLA University of Sci. & Tech., Nanjing 211101; Station of Communication, the General Hospital, PLA, Beijing 100853 );The Multi-object Weights Evaluation Method Based on Ideal Interval Number and Entropy[J];Chinese Journal of Engineering Mathematics;2006-01
6 DUAN Jin-li,ZHANG Qi-shan,LIU Wei-jia(Management School,Fuzhou University,Fuzhou 350002,China);The Model of Information System's Risk Assessment Based on Analytic Hierarchy Process and Grey Theory[J];Journal of Guangdong University of Technology;2006-04
7 Shi Wenchang Sun Yufang (Institute of Software,Chinese Academy of Sciences, Beijing,100080, China);Evolution of Computer Security Evaluation Criteria and Progress in Computer Security Products[J];Guangxi Sciences;2001-03
8 CHEN Ping, ZHANG Yi-hao, SONG Jin-yu, ZHAO Cheng (Institute of Command Automation, PLA Univ. of Sci. & Tech., Nanjing 210007, China);Design and Implementation of Audit System in Linux Kernel[J];Journal of PLA University of Science and Technology(Natural Science);2004-03
9 Shen Qingni, Qing Sihan, and Li Liping (Engineering and Research Center for Information Security Technology, Chinese Academy of Sciences, Beijing 100080) (Institute of Software, Chinese Academy of Sciences, Beijing 100080) (Graduate University, Chinese Academy of Sciences, Beijing 100049);Design and Implementation of a Multi-Layered Privilege Control Mechanism[J];Journal of Computer Research and Development;2006-03
10 LIU Jianbo 1,2, CHEN Kaiming1, CHEN Xuejun2(1. Dept. of Computer Sci. & Tech., Univ. of Sci. & Tech. of China, Hefei 230027, China;2. Tranining Dept., Urumchi Command Academy of Chinese Armed Police Force, Urumchi 830001, China);Improved database audit-log model based on session tree[J];Computer Aided Engineering;2007-01
China Proceedings of conference Full-text Database 3 Hits
1 Li MeiJuan, Cai Mian, Chang WeiHua, Jia Jia (College of Electronic and Control Engineering of Beijing University of Technology, Beijing, 10002, China);Study on Evaluating Technology of Operation System Security Level[A];[C];2006
2 SHEN Qing-Ni, QING Si-Han, HE Ye-Ping, SHEN Jian-Jun, Engineering and Research Center for Information Security Technology, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China Graduate School of Chinese Academy of Sciences, Beijing 100039, China;A Policy-Adaptive Capability Inheritance Algorithm Consistent with POSIX Standard[A];[C];2005
3 CHEN Xunxun, FANG Binxing Computer Network And Information Security Technology Research Center, HIT, Harbin 150001,P. R. China;On Hierarchy Architecture of Information Security[A];[C];2005
【Co-references】
Chinese Journal Full-text Database 3 Hits
1 ZHAO Fang-yuan, WEI Zhi-qiang, LIN Yong( Department of Computer Application and Technology, Ocean University of China, Qingdao 266071, China; ElectricPower Company of Weifang, Weifang 261021, China);Research and application of reconfigurable software development platform based on component[J];Computer Engineering and Design;2005-01
2 Department of Army Management, College of In- formation Engineering, PLA Information Engineer- ing University, HeNan ZhengZhou, 450002)Zhang, Xiaojuan Yang,Shisong;Hardware Data Recovery in Information Emergency Response[J];;2006-12
3 Wang,Wei Ran,Chunyu Zhang,Qiusheng;Design of Data Storage Solution of Intelligent Building[J];;2006-16
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved