Evaluating the network security by the Read<sub>W</sub>rite transition model

The Read<sub>W</sub>rite transition model and correlative concepts were presented for the root directory with Read<sub>W</sub>rite privilege setting; then the model transition function was formalized by the state transition arithmetic operator . Based on the transition model...

Full description

Saved in:
Bibliographic Details
Main Authors: LU Zhi-yong1, 2, FENG Chao1, YU Hui2
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2010-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74647017/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537709877755904
author LU Zhi-yong1
2
FENG Chao1
YU Hui2
author_facet LU Zhi-yong1
2
FENG Chao1
YU Hui2
author_sort LU Zhi-yong1
collection DOAJ
description The Read<sub>W</sub>rite transition model and correlative concepts were presented for the root directory with Read<sub>W</sub>rite privilege setting; then the model transition function was formalized by the state transition arithmetic operator . Based on the transition model,the network security state transition machine and the network security evaluation model were designed. Finally,the method’s feasibility and validity were verified by analyzing some practical examples.
format Article
id doaj-art-24bc7431f47040388234f24750695cc1
institution Kabale University
issn 1000-436X
language zho
publishDate 2010-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-24bc7431f47040388234f24750695cc12025-01-14T08:25:28ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2010-01-01319410274647017Evaluating the network security by the Read<sub>W</sub>rite transition modelLU Zhi-yong12FENG Chao1YU Hui2The Read<sub>W</sub>rite transition model and correlative concepts were presented for the root directory with Read<sub>W</sub>rite privilege setting; then the model transition function was formalized by the state transition arithmetic operator . Based on the transition model,the network security state transition machine and the network security evaluation model were designed. Finally,the method’s feasibility and validity were verified by analyzing some practical examples.http://www.joconline.com.cn/zh/article/74647017/ReadWrite transition modelnetwork securityevaluationmodeling
spellingShingle LU Zhi-yong1
2
FENG Chao1
YU Hui2
Evaluating the network security by the Read<sub>W</sub>rite transition model
Tongxin xuebao
ReadWrite transition model
network security
evaluation
modeling
title Evaluating the network security by the Read<sub>W</sub>rite transition model
title_full Evaluating the network security by the Read<sub>W</sub>rite transition model
title_fullStr Evaluating the network security by the Read<sub>W</sub>rite transition model
title_full_unstemmed Evaluating the network security by the Read<sub>W</sub>rite transition model
title_short Evaluating the network security by the Read<sub>W</sub>rite transition model
title_sort evaluating the network security by the read sub w sub rite transition model
topic ReadWrite transition model
network security
evaluation
modeling
url http://www.joconline.com.cn/zh/article/74647017/
work_keys_str_mv AT luzhiyong1 evaluatingthenetworksecuritybythereadsubwsubritetransitionmodel
AT 2 evaluatingthenetworksecuritybythereadsubwsubritetransitionmodel
AT fengchao1 evaluatingthenetworksecuritybythereadsubwsubritetransitionmodel
AT yuhui2 evaluatingthenetworksecuritybythereadsubwsubritetransitionmodel