Research on information system security models

被引:0
作者
Li, Shou-Peng [1 ]
Sun, Hong-Bo [2 ]
机构
[1] Coll. of Math., Sichuan Univ., Chengdu 610063, China
[2] Dept. of Comp. Sci. and Technol., Electron. Sci. and Technol. Inst., Beijing 100070, China
来源
Tien Tzu Hsueh Pao/Acta Electronica Sinica | 2003年 / 31卷 / 10期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
12
引用
收藏
页码:1491 / 1495
相关论文
共 50 条
[41]   Research on Core Technology Based on Computer Information System Security Architecture [J].
Liu, Shaogang .
2018 3RD INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE), 2018, :607-610
[42]   Research on the Quantitative Methods of Classified Information System Security Risk Assessment [J].
Zhang, Kang ;
Shao, Liping .
LISS 2014, 2015, :571-575
[43]   Electronic Commerce in China Information Security Management System Strategy Research [J].
Ji, Hong ;
Zou, Shuyuan .
PROCEEDINGS OF 2016 2ND INTERNATIONAL CONFERENCE ON HUMANITIES AND SOCIAL SCIENCE RESEARCH (ICHSSR 2016), 2016, 70 :536-538
[44]   Research of WeChat Public Number's Security of Power Information System [J].
Gao Peng ;
Shi Cong-cong ;
Fan Jie .
PROCEEDINGS OF THE 2015 JOINT INTERNATIONAL MECHANICAL, ELECTRONIC AND INFORMATION TECHNOLOGY CONFERENCE (JIMET 2015), 2015, 10 :1026-1030
[45]   Research on security evaluation system of network information system based on rough set theory [J].
Chen, Jia ;
Miao, Yingkai .
INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2021, 14 (03) :155-161
[46]   Empirical Research and Research Ethics in Information Security [J].
Weippl, Edgar ;
Schrittwieser, Sebastian ;
Rennert, Sylvi .
INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP 2016), 2017, 691 :14-22
[47]   Research on the security of information system authentication scheme based on the fuzzy number intuitionistic fuzzy information [J].
Wang, Yajie ;
Yu, Huan ;
Shi, Feng .
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 37 (02) :1629-1637
[48]   Computer and Information Security Ethics' Models [J].
Taherdoost, Hamed ;
Sahibuddin, Shamsul ;
Namayandeh, Meysam ;
Jalaliyoon, Neda .
2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT), 2014, :145-149
[49]   Information security in IT global sourcing models [J].
Perechuda, Kazimierz ;
Sobinska, Malgorzata .
FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2014, 2014, 2 :1441-1447
[50]   Practical application of information security models [J].
Jirasek, Vladimir .
Information Security Technical Report, 2012, 17 (1-2) :1-8