参考文献/References:
[1] Gilmont T,Legat J D,Quisquater J J.An architecture of security management unit [J].Proceedings of SPIE:Security and Watermarking of Multimedia Contents, 1999,36:472-483.
[2] The International Organization for Standardization.ISO/IEC 15408:1999(E)Common Criteria for Information Technology Security Evaluation[S].Geneva,Switzerland,1999.
[3] Donn B P.反计算机犯罪[M].北京:电子工业出版社,1999.30-89.
Donn B P.Fighting computer crime[M].Beijing:Electronic Industries Publishing Company,1999.30-89.(in Chinese)
[4] Gilmont T,Legat J D,Quisquater J J.An architecture of security management unit for safe hosting of multiple agents[A].In: International Workshop on Intelligent Communications and Multimedia Terminals(COST254)[C].Ljubljana,1998.79-82.
[5] Bertino E,Buccafurri F,Ferrari E,et al.A logical framework for reasoning on data access control policies[A].In:Proc 12th IEEE Computer Security Foundations Workshop[C].Mordano,Italy,1999.175-189.
[6] Lupu E,Sloman M.Conflicts in policy-based distributed systems management[J]. IEEE Trans on Software Engineering, 1999,25(6):852-869.
[7] Systems security engineering capability maturity model(SSE-CMM)version 2.0.The National Information Systems Security Conference.Baltimore,Maryland,1999.http://www.sse-cmm.org.2001-02-03.
[8] 李新运,常 勇,李 望.重大工程项目灾害风险评估方法研究[J].自然灾害学报,1998,7(4):24-28.
Li Xinyun,Chang Yong,Li Wang.Research on disaster risk assessment for critical engineering[J].Journal of Natural Disasters,1998,7(4):24-28.(in Chinese)
[9] Karjoth G,Lange D B,Oshima M.A security model for aglets[J]. IEEE Internet Computing,1997,1(4):68-77.
[10] 宋如顺,钱 钢.基于SSE-CMM的信息安全管理与控制[J].计算机工程与应用,2000(12):37-40.
Song Rushun,Qian Gang.Management and control of info-sec based on SSE-CMM [J].Journal of Computer Engineering and Application,2000(12):37-40.(in Chinese)
[11] 钱 钢,达庆利.基于系统安全工程能力成熟模型的信息系统风险评估[J].管理工程学报,2001,15(4):58-60.
Qian Gang,Da Qingli.The information system risk evaluation based on system security engineering capability maturity model[J].Journal of Industrial Engineering and Engineering Management,2001,15(4):58-60.(in Chinese)