浏览全部资源
扫码关注微信
1. 国防科技大学电子科学与工程学院
2. 六三八八零部队
Published:2010
移动端阅览
LU Zhi-yong1, 2, FENG Chao1, et al. Evaluating the network security by the ReadWrite transition model[J]. 2010, 31(4): 94-102.
DOI:
LU Zhi-yong1, 2, FENG Chao1, et al. Evaluating the network security by the ReadWrite transition model[J]. 2010, 31(4): 94-102. DOI:
提出了用于网络中根目录读写管理权限转换的Read
W
rite转换模型及其相关概念
然后用状态转换算子对模型转换功能进行了数学描述
设计了基于Read
rite转换模型的网络安全状态转换器
并以此建立了网络安全性评估模型。最后
通过举例分析证实了所提出方法的可行性和有效性。
The Read
rite transition model and correlative concepts were presented for the root directory with Read
rite privilege setting; then the model transition function was formalized by the state transition arithmetic operator . Based on the transition model
the network security state transition machine and the network security evaluation model were designed. Finally
the method’s feasibility and validity were verified by analyzing some practical examples.
0
Views
669
下载量
2
CSCD
Publicity Resources
Related Articles
Related Author
Related Institution