期刊文献+

网络信息安全分层模型的研究 被引量:5

Research on Layer-based Model of Network Information Safety
下载PDF
导出
摘要 在分析影响网络安全几个因素的基础上,分别从OSI/ISO七层网络协议和三层网络结构2个角度,讨论了各个层次网络安全存在的风险和问题,给出了解决各层安全问题应该采用的防范措施。结果认为,为保障网络信息安全,既要弄清网络协议本身存在的问题和漏洞,又要深入研究实际组网的客观要求和情况。 Based on the analysis of factors of network safety, risks and problems in each layer of network are discussed separately from the perspectives of OSI/ISO seven layers network protocol and three layer network frame. Precautions are provided for the safety problem in each layer of network. The conclusion is that to keep network information safe, it is necessary to not only figure out the problems and vulnerability of network protocol, but also learn about the real requirements and situations in netting.
作者 李成耀
出处 《武汉理工大学学报(信息与管理工程版)》 CAS 2007年第7期24-26,30,共4页 Journal of Wuhan University of Technology:Information & Management Engineering
基金 教育部专题特色库建设资助项目(4401-2-014)
关键词 网络协议 分层模型 信息安全 network protocol layer - based model information safety
  • 相关文献

参考文献5

二级参考文献27

  • 1胡道元,计算机网络.高级,1999年 被引量:1
  • 2张常芬,计算机安全技术,1998年 被引量:1
  • 3F Thayer, J C Herzog, J D Guttman. Honest Ideals on Strand Spaces[C]. Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998.66-77. 被引量:1
  • 4D Song. Athena, Automatic Checker for Security Protocol Analysis?[C]. Proceedings of the IEEE Computer Security Foundation Workshop, 1999. 192-202. 被引量:1
  • 5D Song, S Berezin, A Perrig. Athena, a Novel Approach to Efficient Automatic Security Protocol Analysis[J]. Journal of Computer Security, 2001,9( 1,2) :47-74. 被引量:1
  • 6C Meadow. A Model of Computation for the NRL Protocol Analyzer[C]. Proceedings of the Computer Security Foundations Workshop,IEEE Computer Society Press, 1994. 被引量:1
  • 7L Paulson. Proving Properties of Security Protocols by Induction[C].Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, 1997.70-83. 被引量:1
  • 8Abadi M, Needham R. Prudent Engineering Practice for Cryptographic Protocols[J]. IEEE Trans Softw. Eng, 1996,22(1) :6-15. 被引量:1
  • 9M Burrows, M Abadi, R Needham. A Logic of Authentication[J].ACM Transactions on Computer Systems, 1990,8(1):18-36. 被引量:1
  • 10R Needham, M Schroeder. Authentication Revisited[J]. ACM Operating Systems Review, 1987,21(1):7. 被引量:1

共引文献9

同被引文献35

引证文献5

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部