期刊文献+

软件脆弱性分类属性研究 被引量:9

Research on Classification Attributes of Software Vulnerability
下载PDF
导出
摘要 针对软件脆弱性分类中分类属性的选择问题,给出软件脆弱性的基本概念,讨论分类研究的目标及属性选取的基本原则。通过对5种典型分类属性的比较和总结,归纳分类属性的类别,提出一个新的分类思路。根据目前分类研究中存在的问题,给出相应的改进措施及未来的发展方向。 Aiming at the problems of selecting classification attributes in software vulnerability classification, this paper presents some concepts about software vulnerability, and discusses the basic principles of selecting the objects and the attributes. By comparing and summarizing five typical taxonomies, a new thought of classifying software vulnerabilities is presented. The problems in current researches are analyzed, and corresponding improvements and developing trends are given.
作者 黄明 曾庆凯
出处 《计算机工程》 CAS CSCD 北大核心 2010年第1期184-186,193,共4页 Computer Engineering
基金 国家自然科学基金资助项目(60773170 60721002 90818022) 国家"863"计划基金资助项目(2006AA01Z432) 高等学校博士学科点专项科研基金资助项目(200802840002)
关键词 软件脆弱性 分类属性 分类法 安全 software vulnerability classification attribute taxonomy security
  • 相关文献

参考文献23

  • 1Piessens F. A Taxonomy of Causes of Software Vulnerabilities in Internet Software[C]//Proc. of the 13th International Symposium on Software Reliability Engineering. Annapolis, MD, USA: [s. n.], 2002. 被引量:1
  • 2Abbott R P, Chin J S, Donnelley J E, et al. Security Analysis and Enhancements of Computer Operating Systems[Z]. Washington, USA: Institute for Science Technology, National Bureau of Standards, 1976. 被引量:1
  • 3Carlstedt J, Bisbey R, Popek G. Pattern-directed Protection Evaluation[Z]. California, USA: Information Science Institute, University of Southern California, 1975. 被引量:1
  • 4Denning D E. Cryptography and Data Security[M]. Boston, USA: Addison-Wesley Longman Publishing Co., Inc., 1983. 被引量:1
  • 5Bishop M, Bailey D. A Critical Analysis of Vulnerability Taxonomies[Z]. California, USA: Department of Computer Science, University of California at Davis, 1996. 被引量:1
  • 6Krsul I. Software Vulnerability Analysis[D]. West Lafayette, USA: Department of Computer Science, Purdue University, 1998. 被引量:1
  • 7Bazaz A, Arthur J D. Towards a Taxonomy of Vulnerabilities[C]// Proc. of the 40th Annual Hawaii Intemational Conference on System Science. Hawaii, USA: [s. n.], 2007. 被引量:1
  • 8Aslam T. A Taxonomy of Security Faults in the Unix Operating System[D]. West Lafayette, USA: Department of Computer Science, Purdue University, 1995. 被引量:1
  • 9Cohen F B. Information System Attacks: A Preliminary Classification Scheme[J]. Computers and Security, 1997, 16(1): 26-49. 被引量:1
  • 10Krsul I, Spafford E, Tripunitara M. Computer Vulnerability Analysis[D]. West LaIhyette, USA: Department of Computer Sciences, Purdue University, 1997. 被引量:1

同被引文献40

引证文献9

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部