메뉴 건너뛰기




Volumn , Issue , 2009, Pages 1547-1549

A new information security model based on network service protection

Author keywords

Implementation logic; Information security; Network service; Protection

Indexed keywords

ELECTRIC POWER; ELECTRICITY SERVICE; IN-NETWORK; INFORMATION NETWORKS; INFORMATION SECURITY; INFORMATION SECURITY MODELS; NETWORK SERVICE SECURITY; NETWORK SERVICES; SECURITY FEATURES; SECURITY MODEL; STABLE OPERATION;

EID: 77952754188     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICISE.2009.91     Document Type: Conference Paper
Times cited : (1)

References (7)
  • 1
    • 0003400251 scopus 로고
    • Secure Computer Systems: Mathematical Foundations
    • National Technical Information Service
    • D. E. Bell, and L. J. LaPadula. Secure Computer Systems: Mathematical Foundations. MITRE Technical Report2547,Volume I. National Technical Information Service, 1973.
    • (1973) MITRE Technical Report2547 , vol.1
    • Bell, D.E.1    LaPadula, L.J.2
  • 4
    • 77952777941 scopus 로고    scopus 로고
    • The Structure and Application of PDR Safety Model in Bank Computer System
    • J
    • Jiang Lingmin.The Structure and Application of PDR Safety Model in Bank Computer System[J].Applications of The Computer Systems,2002(12):38-40.
    • (2002) Applications of the Computer Systems , Issue.12 , pp. 38-40
    • Jiang, L.1
  • 5
    • 77952780041 scopus 로고    scopus 로고
    • Research on Information Security Model
    • J. in Chinese
    • Zhang Yuan, Shi Hao-shan.Research on Information Security Model[J].Journal of Chinese Computer Systems(in Chinese),2003,24(10):1878-1881.
    • (2003) Journal of Chinese Computer Systems , vol.24 , Issue.10 , pp. 1878-1881
    • Zhang, Y.1    Shi, H.-S.2
  • 6
    • 77952767155 scopus 로고    scopus 로고
    • Component Model for Service Management and ITS Implementation in Enterprise Network Management
    • in Chinese
    • Tang Yazhe Zhang Pengli Zeng zhi. Component Model for Service Management and ITS Implementation in Enterprise Network Management. Journal of Chinese Computer Systems(in Chinese),2001,22(12):1508-1511.
    • (2001) Journal of Chinese Computer Systems , vol.22 , Issue.12 , pp. 1508-1511
    • Tang, Y.1    Zhang, P.2    Zeng, Z.3
  • 7
    • 0016600186 scopus 로고
    • Operating System Penetration
    • AFIPS Press, Montvale, N.J.
    • Linde R.R. Operating System Penetration. Proceedings of National Computer Conference, Vol.44, AFIPS Press, Montvale, N.J., 1975:361-368.
    • (1975) Proceedings of National Computer Conference , vol.44 , pp. 361-368
    • Linde, R.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.