Evaluating the network security by the Read<sub>W</sub>rite transition model
The Read<sub>W</sub>rite transition model and correlative concepts were presented for the root directory with Read<sub>W</sub>rite privilege setting; then the model transition function was formalized by the state transition arithmetic operator . Based on the transition model...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2010-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74647017/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537709877755904 |
---|---|
author | LU Zhi-yong1 2 FENG Chao1 YU Hui2 |
author_facet | LU Zhi-yong1 2 FENG Chao1 YU Hui2 |
author_sort | LU Zhi-yong1 |
collection | DOAJ |
description | The Read<sub>W</sub>rite transition model and correlative concepts were presented for the root directory with Read<sub>W</sub>rite privilege setting; then the model transition function was formalized by the state transition arithmetic operator . Based on the transition model,the network security state transition machine and the network security evaluation model were designed. Finally,the method’s feasibility and validity were verified by analyzing some practical examples. |
format | Article |
id | doaj-art-24bc7431f47040388234f24750695cc1 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2010-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-24bc7431f47040388234f24750695cc12025-01-14T08:25:28ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2010-01-01319410274647017Evaluating the network security by the Read<sub>W</sub>rite transition modelLU Zhi-yong12FENG Chao1YU Hui2The Read<sub>W</sub>rite transition model and correlative concepts were presented for the root directory with Read<sub>W</sub>rite privilege setting; then the model transition function was formalized by the state transition arithmetic operator . Based on the transition model,the network security state transition machine and the network security evaluation model were designed. Finally,the method’s feasibility and validity were verified by analyzing some practical examples.http://www.joconline.com.cn/zh/article/74647017/ReadWrite transition modelnetwork securityevaluationmodeling |
spellingShingle | LU Zhi-yong1 2 FENG Chao1 YU Hui2 Evaluating the network security by the Read<sub>W</sub>rite transition model Tongxin xuebao ReadWrite transition model network security evaluation modeling |
title | Evaluating the network security by the Read<sub>W</sub>rite transition model |
title_full | Evaluating the network security by the Read<sub>W</sub>rite transition model |
title_fullStr | Evaluating the network security by the Read<sub>W</sub>rite transition model |
title_full_unstemmed | Evaluating the network security by the Read<sub>W</sub>rite transition model |
title_short | Evaluating the network security by the Read<sub>W</sub>rite transition model |
title_sort | evaluating the network security by the read sub w sub rite transition model |
topic | ReadWrite transition model network security evaluation modeling |
url | http://www.joconline.com.cn/zh/article/74647017/ |
work_keys_str_mv | AT luzhiyong1 evaluatingthenetworksecuritybythereadsubwsubritetransitionmodel AT 2 evaluatingthenetworksecuritybythereadsubwsubritetransitionmodel AT fengchao1 evaluatingthenetworksecuritybythereadsubwsubritetransitionmodel AT yuhui2 evaluatingthenetworksecuritybythereadsubwsubritetransitionmodel |