浏览全部资源
扫码关注微信
1. 国防科技大学电子科学与工程学院
2. 六三八八零部队
纸质出版日期:2010
移动端阅览
鲁智勇, 冯超, 余辉, 等. 基于ReadWrite转换模型的网络安全性评估[J]. 通信学报, 2010,31(4):94-102.
LU Zhi-yong1, 2, FENG Chao1, et al. Evaluating the network security by the ReadWrite transition model[J]. 2010, 31(4): 94-102.
鲁智勇, 冯超, 余辉, 等. 基于ReadWrite转换模型的网络安全性评估[J]. 通信学报, 2010,31(4):94-102. DOI:
LU Zhi-yong1, 2, FENG Chao1, et al. Evaluating the network security by the ReadWrite transition model[J]. 2010, 31(4): 94-102. DOI:
提出了用于网络中根目录读写管理权限转换的Read
W
rite转换模型及其相关概念
然后用状态转换算子对模型转换功能进行了数学描述
设计了基于Read
rite转换模型的网络安全状态转换器
并以此建立了网络安全性评估模型。最后
通过举例分析证实了所提出方法的可行性和有效性。
The Read
rite transition model and correlative concepts were presented for the root directory with Read
rite privilege setting; then the model transition function was formalized by the state transition arithmetic operator . Based on the transition model
the network security state transition machine and the network security evaluation model were designed. Finally
the method’s feasibility and validity were verified by analyzing some practical examples.
0
浏览量
78
下载量
2
CSCD
关联资源
相关文章
相关作者
相关机构