Evaluating the network security by the Read<sub>W</sub>rite transition model

The Read<sub>W</sub>rite transition model and correlative concepts were presented for the root directory with Read<sub>W</sub>rite privilege setting; then the model transition function was formalized by the state transition arithmetic operator . Based on the transition model...

Full description

Saved in:
Bibliographic Details
Main Authors: LU Zhi-yong1, 2, FENG Chao1, YU Hui2
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2010-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74647017/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The Read<sub>W</sub>rite transition model and correlative concepts were presented for the root directory with Read<sub>W</sub>rite privilege setting; then the model transition function was formalized by the state transition arithmetic operator . Based on the transition model,the network security state transition machine and the network security evaluation model were designed. Finally,the method’s feasibility and validity were verified by analyzing some practical examples.
ISSN:1000-436X