Journal Home Online First Current Issue Archive For Authors Journal Information 中文版

Strategic Study of CAE >> 2004, Volume 6, Issue 1

Summarization of Network Security

Department of Electronics Engineering of Tsinghua University , Beijing 10084 , China

Funding project:国家自然科学基金重点资助项目(90204004) Received: 2003-06-17 Revised: 2003-08-25 Available online: 2004-01-20

Next Previous

Abstract

The content of computer network security is discussed in this article Firstly, the concept, system and structure and model of computer network security are given. Then the main content and correlative researching aspect are included. In the end, the main product is introduced.

Keywords

computer ; network ; system ; security

Figures

图1

图2

References

[ 1 ] 林晓焕, 林 刚.数字地球下的网络信息安全问题研究[J].现代计算机, 2001, (9) :44~51 link1

[ 2 ] 何红波, 王文军.大型计算机网络系统的安全控制[J].电子对抗技术, 2000, 15 (3) :44~48 link1

[ 3 ] 胡西川.维护网络硬件设施保障系统安全运行[J].电子质量, 2003, (2) :100 link1

[ 4 ] SchneierB .Secretsandlies-digitalsecurityinanetworkedworld[M ].NewYork:JohnWileyPress, 2000

[ 5 ] 网络安全的目标[EB/OL].http://xexploit.css.com.cn/ ghost/aqjd/content/a16.htm, 2003-08-19

[ 6 ] 吴会松.网络安全讲座[J].中国数据通讯网络, 2000, (2) :46~51 link1

[ 7 ] 陈修环, 石 岩.计算机网络安全管理[J].小型微型计算机系统, 1999, 20 (5) :343~346 link1

[ 8 ] 段海新, 吴建平.计算机网络安全体系的一种框架结构及其应用[J].计算机工程与应用, 2000, (5) :24~27 link1

[ 9 ] 董永乐, 史美林, 张信成.主动-增强防御体系结构及其在CSCW中的应用[EB/OL].http://cscw.cs.tsinghua.edu.cn/cscwpapers/dyle/Paper-for-mag.doc, 1999-06-08

[10] 卿斯汉.网络安全检测的理论和实践 (一) [J].计算机系统应用, 2001, (11) :24~26 link1

[11] BrewerD , NashM .TheChineseWallSecurityPolicy[A].IEEESymposiumonSecurityandPrivacy[C].IEEE :ComputerSocietyPress, 1989

[12] MillenJK .Modelsofmultilevelcomputersecurity[J].AdvancesinComputrs, 1989, (29) :1~45

[13] 蒋 韬, 李信满, 刘积仁.信息安全模型研究[J].小型微型计算机系统, 2000, 21 (10) :1078~1080 link1

[14] 网络安全威胁的主要来源[EB/OL].http://www0.ccidnet.com/news/ gl/2001/06/01/54-48727.html, 2001-06-01

[15] 刘 琦.网络安全的脆弱性及常见攻击手段[J].公安大学学报, 2001, 22 (22) :17~19 link1

[16] 金 雷, 谢 立.网络安全综述[J].计算机工程与设计, 2003, 24 (2) :19~22 link1

[17] PaulsonLD .Wanted:morenetwork securitygraduatesandresearch[J].Computer, 2002, 35 (2) :22~24

[18] 嗅探原理与反嗅探技术详解[EB/OL].http://www.xfocus.net/articles/200110/279.html, 2001-10-16

[19] 解读特洛伊木马[EB/OL].http://tech.tyfo.com/tech/block/html/2001070400248.html, 2001-07-04

[20] 电子邮件炸弹攻防[EB/OL].http://elvishua.myetang.com/wlsafe/aqcl/03.htm, 2003-06-05

[21] BurnettS , PaineA .CRYPTOGRAPHY密码工程[M].冯登国.北京:清华大学出版社, 2001 link1

[22] 安全标准与体系[EB/OL].http://www.ihep.ac.cn/security/lanmu/biaozhun, 2003-08-20

[23] 赵战生, 冯登国, 戴英侠, 等.信息安全技术浅谈[M].北京:科学出版社, 1999 link1

Related Research