期刊文献+

赛搏空间网络安全体系结构演化与设计方法探讨 被引量:1

在线阅读 下载PDF
导出
摘要 本文在介绍赛博空间网络构建的意义的基础上,阐述了进赛搏空间网络安全需求,并给出了赛搏空间网络的安全体系结构设计方法。
出处 《无线互联科技》 2011年第6期3-5,9,共4页 Wireless Internet Technology
基金 国家自然科学基金"信息系统的安全风险跟踪评价与动态预测" 编号60903027 2009-2011
  • 相关文献

参考文献11

  • 1王佳昊,秦志光,蓝天,赵洋.一种改进的无线传感器网络随机密钥预分配算法[J].电子科技大学学报,2006,35(S1):710-713. 被引量:3
  • 2李平,林亚平,曾玮妮.传感器网络安全研究(英文)[J].软件学报,2006,17(12):2577-2588. 被引量:30
  • 3张宏,贺也平,石志国.基于周期时间限制的自主访问控制委托模型[J].计算机学报,2006,29(8):1427-1437. 被引量:20
  • 4陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:342
  • 5Anish Arora,Prabal Dutta,Sandp Bapat,et al.A Line in the Sand:a wireless Sensor-Network For Target Deteetion,Classifieation and Tracking. ComPuter Networks:The international Joumal of Distributed Informatique . 2004
  • 6Gaubatz Gunnar,Kaps Jens-Peter,zturk Erdineo,et al.State of the Art in public-Key Cryptography for Wireless Sensor Networks. Second IEEE hitemational Workshops on pervasive Computing and Cotnmunication security (persec 2005) . 2005
  • 7G Acs,L Butty’’an,I vajda.The security proof of a Link-State Routing protocol for Wireless Sensor Networks. Mobile Adhoc and Sensor System (MASS),2007IEEE International Conference on . 2007
  • 8JOSEPH H SCHERRER,WILLIAM C GRUND.A Cy-berspace Command and Control Model. . 2009
  • 9CHALRS CLUM.Cyberspace Policy Review:Assuring a Trus-ted and Resilient Information and Communications Infra-structure. http://aupress.au.af.mil . 2010
  • 10KARMA GABRIELLE.Cyber Vision and Cyber Force Devel-opment. http://research.au.af.mil . 2010

二级参考文献53

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:309
  • 2徐震,李斓,冯登国.基于角色的受限委托模型[J].软件学报,2005,16(5):970-978. 被引量:52
  • 3Bertino E. , Bettini C. , Ferrari E. , Samarati P.. A temporal access control mechanism for database systems. IEEE Transactions on Knowledge and Data Engineering, 1996, 8(1) : 67-80
  • 4Bertino E. , Bettini C. , Ferrari E. , Samarati P.. An access control model supporting periodicity constraints and temporal reasoning. ACM Transactions on Database Systems, 1998, 23(3) : 213-285
  • 5Zhang L. , Ahn G. J. , Chu B. T.. A rule-based framework for role-based delegation. In: Proceedings of the 6th ACM symposium on Access Control Models and Technologies, Virginia,USA, 2001, 153-162
  • 6Jajodia S. , Samarati P. , Subrahmanian V. S. , Bertino E..Flexible support for multiple access control policies. ACM Transactions on Database Systems, 2001, 26(2): 214-260
  • 7Gal A. , Atluri V.. An authorization model for temporal data.In: Proceedings of the 7th ACM Conference on Computer and Communieations Seeurity, Athens, Oreeee, 2000, 144-153
  • 8Damianou N.. A policy framework for management of distributed systems[Ph. D. dissertation]. University of London, London, 2002
  • 9Solworth J. A. , Sloan R. H.. A layered design of discretionary access controls with decidable safety properties. In: Proceedings of the 25th IEEE Symposium on Security and Privacy,Berkeley, California, 2004, 56 - 67
  • 10Li Ning-Hui, Tripunitara M. V.. On safety in discretionary access control. In: Proceedings of the 26th IEEE Symposium on Security and Privacy, Oakland, California, 2005, 96-109

共引文献385

同被引文献6

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部