Design and implementation of national security vulnerability database

Base on both domestic and overseas research on vulnerability database,considering our national conditions and the security requirements,a security vulnerability database model was proposed.It’s compatible with multiple stan-dards,and could be used to classify vulnerability attributes through groups....

Full description

Saved in:
Bibliographic Details
Main Authors: ZHANG Yu-qing1, WU Shu-ping1, LIU Qi-xu1, LIANG Fang-fang1
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2011-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74418363/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537807888154624
author ZHANG Yu-qing1
WU Shu-ping1
LIU Qi-xu1
LIANG Fang-fang1
author_facet ZHANG Yu-qing1
WU Shu-ping1
LIU Qi-xu1
LIANG Fang-fang1
author_sort ZHANG Yu-qing1
collection DOAJ
description Base on both domestic and overseas research on vulnerability database,considering our national conditions and the security requirements,a security vulnerability database model was proposed.It’s compatible with multiple stan-dards,and could be used to classify vulnerability attributes through groups.The national security vulnerability database was implemented based on the model and applied to security warning and emergency response.This work has brought satisfactory effects in practice.
format Article
id doaj-art-95cb8d6dd8a64bcfa7f11648498b3f98
institution Kabale University
issn 1000-436X
language zho
publishDate 2011-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-95cb8d6dd8a64bcfa7f11648498b3f982025-01-14T08:23:04ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2011-01-01329310074418363Design and implementation of national security vulnerability databaseZHANG Yu-qing1WU Shu-ping1LIU Qi-xu1LIANG Fang-fang1Base on both domestic and overseas research on vulnerability database,considering our national conditions and the security requirements,a security vulnerability database model was proposed.It’s compatible with multiple stan-dards,and could be used to classify vulnerability attributes through groups.The national security vulnerability database was implemented based on the model and applied to security warning and emergency response.This work has brought satisfactory effects in practice.http://www.joconline.com.cn/zh/article/74418363/information securitysecurity vulnerabilitysecurity vulnerability databasevulnerability standard
spellingShingle ZHANG Yu-qing1
WU Shu-ping1
LIU Qi-xu1
LIANG Fang-fang1
Design and implementation of national security vulnerability database
Tongxin xuebao
information security
security vulnerability
security vulnerability database
vulnerability standard
title Design and implementation of national security vulnerability database
title_full Design and implementation of national security vulnerability database
title_fullStr Design and implementation of national security vulnerability database
title_full_unstemmed Design and implementation of national security vulnerability database
title_short Design and implementation of national security vulnerability database
title_sort design and implementation of national security vulnerability database
topic information security
security vulnerability
security vulnerability database
vulnerability standard
url http://www.joconline.com.cn/zh/article/74418363/
work_keys_str_mv AT zhangyuqing1 designandimplementationofnationalsecurityvulnerabilitydatabase
AT wushuping1 designandimplementationofnationalsecurityvulnerabilitydatabase
AT liuqixu1 designandimplementationofnationalsecurityvulnerabilitydatabase
AT liangfangfang1 designandimplementationofnationalsecurityvulnerabilitydatabase