期刊文献+

螺旋模型在开发网络可存活性系统中的应用 被引量:3

Developing network survivable system with spiral model
在线阅读 下载PDF
导出
摘要 介绍了网络可存活性系统的概念及其开发特点,阐述了螺旋模型适合开发网络可存活性系统的理由,介绍了采用螺旋模型开发网络可存活性系统的过程,包括需求分析、设计、编码验证、测试和维护进化等5个阶段。 The definition of network survivable system and its developing characteristics are introduced. It is clarified that spiral model is a natural fit for development of survivable systems. The spiral management process for network survivable system is explained, including requirements definition, design, coding and verification, testing, maintenance and evolution.
出处 《计算机工程与设计》 CSCD 北大核心 2005年第5期1390-1392,1395,共4页 Computer Engineering and Design
关键词 螺旋模型 网络可存活性系统 系统开发生命周期 编码验证 spiral model network survivable system system development life cycle
  • 相关文献

参考文献5

  • 1National Computer Security Center. A guide to understanding discretionary access control in trusted systems[S]. 1987.
  • 2Sullivan K, Knight J, Du X, et al. Information survivability control systems[C]. Proceedings:21st International Conference on Software Engineering, CA: IEEE Computer Society Press, Los alamitos, 1997.
  • 3Richard C Linger.Life-cycle models for survivable systems technical report[Z]. CMU/SEI-2002-TR-026 ESC-TR-2002-026.
  • 4齐瑀,王春森,孙宇辉.螺旋模型在开发专家系统中的应用[J].计算机工程,1997,23(4):53-55. 被引量:3
  • 5夏春和,王继伟,赵勇,吴震.可生存性分析方法研究[J].计算机应用研究,2002,19(12):28-32. 被引量:7

二级参考文献12

  • 1熊模华,张翔立,周济.快速原型法思想在工具行业CAD/CAM软件二次开发中的应用[J].计算机应用研究,1995,12(2):79-81. 被引量:2
  • 2余金山.软件开发过程及其模型(Ⅱ)[J].计算机应用与软件,1995,12(4):1-8. 被引量:7
  • 3麦中凡,熊璋.兆程序设计与软件过程驱动的软件开发[J].计算机科学,1996,23(1):44-48. 被引量:3
  • 4[1]S Muftic, A Patel, et al. Security Architecture for Open Distributed Systems[ C]. John Wiley & Sons, 1993.5-9.
  • 5[2]G Tsudik. Access Control and Policy Enforcement in Internetworks[ C]. Ph. D Dissertation, University of Southern California.April, 1991.2-7.
  • 6[3]David E Ferraiolo, Janet A Cugini, D Richard Kuhn. Role-based Access Control ( RBAC ) : Features and Motivations [C].Proceedings 1 1th Annual Computer Security Application Conference, New Orleans, LA, 1995,7-19.
  • 7[4]National Computer Security Center. A Guide to Understanding Discretionary Access Control in Trusted Systems[S]. 1987.8-27.
  • 8[5]K Sullivan, J Knight, X Du, S Geist. Information Survivability Control Systems [C]. Proceedings: 21st International Conference on Software Engineering, IEEE Computer Society Press, Los alamitos, CA, 1999.40-71.
  • 9[6]Lipson H, Longstaff T. Proceedings of the SEI 1997 Information Survivability Workshop[ C]. San Diego, CA, Feb. 10-13, 1997.Los Alamitos, CA: IEEE Computer Society Press, 1997.
  • 10[7]R C Linger, N R Mead, et al. Requirements Definition for Survivable Network Systems[ EB/OL]. http://www. cmu. edu/.

共引文献8

同被引文献8

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部