Research on quantitative evaluation the assurance of information security products

被引:0
|
作者
Chen, Chi [1 ]
Feng, Deng-Guo [1 ]
Xu, Zhen [1 ]
机构
[1] State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:1886 / 1891
相关论文
共 50 条
  • [1] Research of Information Security Quantitative Evaluation Method
    Zang Wenlong
    APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 369 - 372
  • [2] Security evaluation for information assurance
    Kim, Yong-Tae
    Park, Gil-Cheol
    Kim, Tai-Hoon
    Lee, Sang-Ho
    ICCSA 2007: PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND APPLICATIONS, 2007, : 227 - +
  • [3] Information security assurance lifecycle research
    XIE, Cheng-shan
    XUJIA, Gu-yue
    WANG, Li
    Journal of China Universities of Posts and Telecommunications, 2007, 14 (04): : 77 - 81
  • [4] Information security assurance lifecycle research
    XIE Cheng-shan State Key Laboratory of Information Security
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2007, (04) : 77 - 81
  • [5] Information Systems Security Criticality and Assurance Evaluation
    Ouedraogo, Moussa
    Mouratidis, Haralambos
    Dubois, Eric
    Khadraoui, Djamel
    ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2010, 6059 : 38 - +
  • [6] Preliminary research on special assurance of network information security
    Wu, Shizhong
    Li, Shoupeng
    He, Dequan
    Tan, Yunmeng
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2003, 31 (01):
  • [7] Research on Information Security Assurance Model of Telecommunication Network
    Zhao, Ling
    Xu, Hong-ke
    Qian, Chao
    2011 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION AND INDUSTRIAL APPLICATION (ICIA2011), VOL III, 2011, : 184 - 187
  • [8] Research on Information Security Assurance Model of Telecommunication Network
    Zhao, Ling
    Xu, Hong-ke
    Qian, Chao
    2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL VIII, 2010, : 184 - 187
  • [9] A multifaceted, evaluation of the reference model of information assurance & security
    Cherdantseva, Yulia
    Hilton, Jeremy
    Rana, Omer
    Ivins, Wendy
    COMPUTERS & SECURITY, 2016, 63 : 45 - 66
  • [10] Information Security Threats and Information Assurance
    Yalman, Yildiray
    Yesilyurt, Murat
    TEM JOURNAL-TECHNOLOGY EDUCATION MANAGEMENT INFORMATICS, 2013, 2 (03): : 247 - 252