-
1
-
-
0003969633
-
Trusted computer system evaluation criteria
-
US National Computer Security Center, NCSC 5200. 28-STD
-
Trusted Computer System Evaluation Criteria [S]. US National Computer Security Center, NCSC 5200. 28-STD, 1985.
-
(1985)
-
-
-
2
-
-
0003765598
-
Information technology security evaluation criteria
-
Provisional Harmonized Criteria of France, Germany, Netherlands, and United Kingdom, Commission of the European Communities
-
Information Technology Security Evaluation Criteria [S]. Provisional Harmonized Criteria of France, Germany, Netherlands, and United Kingdom, Commission of the European Communities, 1991.
-
(1991)
-
-
-
3
-
-
34250015830
-
Information technology-code of practice for information security management
-
The International Organization for Standardization, ISO/IEC 17799: 2000 (E)
-
The International Organization for Standardization. Information Technology-Code of Practice for Information Security Management, ISO/IEC 17799: 2000 (E) [S]. 1999.
-
(1999)
-
-
-
4
-
-
8444236881
-
Common criteria for information technology security evaluation - Part 1: Tntroduction and general model
-
The International Organization for Standardization, ISO/IEC 15408-1: 1999 (E)
-
The International Organization for Standardization. Common Criteria for Information Technology Security Evaluation - Part 1: Tntroduction and General Model, ISO/IEC 15408-1: 1999 (E) [S]. 1999.
-
(1999)
-
-
-
5
-
-
0012248971
-
Common criteria for information technology security evaluation - Part 2: Security function requirements
-
The International Organization for Standardization, ISO/IEC 15408-2: 1999 (E)
-
The International Organization for Standardization. Common Criteria for Information Technology Security Evaluation - Part 2: Security Function Requirements, ISO/IEC 15408-2: 1999 (E) [S]. 1999.
-
(1999)
-
-
-
6
-
-
33745585723
-
Common criteria for information technology security evaluation - Part 3: Security assurance requirements
-
The International Organization for Standardization, ISO/IEC 15408-3: 1999 (E)
-
The International Organization for Standardization. Common Criteria for Information Technology Security Evaluation - Part 3: Security Assurance Requirements, ISO/IEC 15408-3: 1999 (E) [S]. 1999.
-
(1999)
-
-
-
7
-
-
34249982315
-
A quantitative evaluation technique of attack effect of computer network based on network entropy
-
ZHANG Y R, XIAN M, WANG G Y. A quantitative evaluation technique of attack effect of computer network based on network entropy [J]. Journal on Communications, 2004, 25 (11): 158-165.
-
(2004)
Journal on Communications
, vol.25
, Issue.11
, pp. 158-165
-
-
Zhang, Y.R.1
Xian, M.2
Wang, G.Y.3
-
8
-
-
34250022909
-
CMS information security risk assessment methodology
-
Centers for Medicare and Medicaid Services (CMS)
-
Centers for Medicare and Medicaid Services (CMS). CMS Information Security Risk Assessment Methodology [S].
-
-
-
-
9
-
-
34250018563
-
A quantitative risk assessment model for information security
-
CHENG X Y, WANG Y M, LIU Z L. A quantitative risk assessment model for information security [J]. Journal of Air Force Engineering University (Natural Science Edition), 2005, 6 (6): 56-59.
-
(2005)
Journal of Air Force Engineering University (Natural Science Edition)
, vol.6
, Issue.6
, pp. 56-59
-
-
Cheng, X.Y.1
Wang, Y.M.2
Liu, Z.L.3
-
10
-
-
34249977330
-
Study on comprehensive assessment method for network security based on AHP and ANN
-
XU F Y, SHEN J, LI J Y. Study on comprehensive assessment method for network security based on AHP and ANN [J]. Computer Engineering and Applications, 2005, 29: 127-129.
-
(2005)
Computer Engineering and Applications
, vol.29
, pp. 127-129
-
-
Xu, F.Y.1
Shen, J.2
Li, J.Y.3
-
11
-
-
7244249876
-
Fuzzy risk assessment of entropy-weight coefficient method applied in network security
-
ZHAO D M, ZHANG Y Q, MA J F. Fuzzy risk assessment of entropy-weight coefficient method applied in network security [J]. Computer Engineering, 2004, 30 (18): 21-23.
-
(2004)
Computer Engineering
, vol.30
, Issue.18
, pp. 21-23
-
-
Zhao, D.M.1
Zhang, Y.Q.2
Ma, J.F.3
-
14
-
-
33745141365
-
Survey of information security risk assessment
-
FENG D G, ZHANG Y, ZHANG Y Q. Survey of information security risk assessment [J]. Journal on Communications, 2004, 25 (7): 10-18.
-
(2004)
Journal on Communications
, vol.25
, Issue.7
, pp. 10-18
-
-
Feng, D.G.1
Zhang, Y.2
Zhang, Y.Q.3
-
15
-
-
0013337442
-
A proposal for construction project risk assessment using fuzzy logic
-
JHM T, CARR V. A proposal for construction project risk assessment using fuzzy logic [J]. Construction Management and Economics, 2000, 18: 491-500.
-
(2000)
Construction Management and Economics
, vol.18
, pp. 491-500
-
-
Jhm, T.1
Carr, V.2
-
16
-
-
10344231556
-
Design of risk-assess tools based on BS7799
-
SUN T, ZHANG Y Q, MENG X W. Design of risk-assess tools based on BS7799 [J]. Computer Engineering, 2004, 30 (22): 63-66.
-
(2004)
Computer Engineering
, vol.30
, Issue.22
, pp. 63-66
-
-
Sun, T.1
Zhang, Y.Q.2
Meng, X.W.3
|