期刊文献+

某省移动公司BOSS安全方案

Secure Scheme of BOSS in One Mobile Company
下载PDF
导出
摘要 通过对某省移动公司业务运营支撑系统(BOSS)的分析,提出了基于BOSS的安全方案,并对某省移动公司的BOSS安全技术体系的第一期部署进行了分析。 Prersents a secure scheme of BOSS (Business & Operation Support System) based on the analysis to one mobile company’s BOSS. The paper also analyzes the first scheme of secure system of BOSS.
出处 《计算机应用研究》 CSCD 北大核心 2005年第8期108-110,共3页 Application Research of Computers
关键词 业务运营支撑系统 防火墙 入侵检测 主机防护 双因素身份认证 BOSS Firewall Intrusion Detection Main Engine Safeguard Identical Authentication of Double Factors
  • 相关文献

参考文献3

二级参考文献15

  • 1[1]Ptacek TH,Newsham TN. Insertion,Evasion,and Denial of Service:Eluding Network Intrusion Detection[Z]. Secure Networks,Inc,January,1998. 被引量:1
  • 2[2]Laing B. How To Guide-Implementing a Network Based Intrusion Detection System[A]. Sovereign House 57/59 Vaster Road Reading RG1 8BT[C], UK, 2000. 被引量:1
  • 3[3]Roesch M. Snort-Lightweight Intrusion Detection for Networks[A]. Proceedings of the 13th Systems Administration Conference[C]. USENIX,1999. 被引量:1
  • 4[4]Roesch M,Green C. Snort Users Manual,Snort Release:1.9.0[EB/OL]. http://www.snort.org/docs/writing_rules-1.9.0/,2001. 被引量:1
  • 5[5]Roesch M,Yarochkin F,Ruiu D, et al. SNORT FAQ Version 1.8[S], 2002-03-25. 被引量:1
  • 6[6]Northcutt S,Novak J,McLanchlan D. Network Intrusion Detection An Analysts Handbook[M]. Indianapolis,Indiana:New Riders publishing,2000. 被引量:1
  • 7Stevens W R. Unix Network Programming Networking APIs:Sockets and XTI[ M]. Prentice Hall PTR. 被引量:1
  • 8M Satyanarayananan,J J Kistler,P Kumar,et al. Coda: A Highly Available File System for a Distributed Workstation [ J ]. IEEE Transactions on Computers, 1990,39(4). 被引量:1
  • 9Papadopoulos G A, Arbab F. Coordination Models and Languages[ M ]. Advances in Computers. Academic Press, 1998. 被引量:1
  • 10J Ousterhout, A Cherenson, et al.The Sprite Network Operating System[J]. IEEE Computer, 1998,21 (2) :23-36. 被引量:1

共引文献96

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部