高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

信息系统灾难恢复计划研究

王琨 尹忠海 周利华 蔡震

王琨, 尹忠海, 周利华, 蔡震. 信息系统灾难恢复计划研究[J]. 电子与信息学报, 2007, 29(4): 776-780. doi: 10.3724/SP.J.1146.2005.01684
引用本文: 王琨, 尹忠海, 周利华, 蔡震. 信息系统灾难恢复计划研究[J]. 电子与信息学报, 2007, 29(4): 776-780. doi: 10.3724/SP.J.1146.2005.01684
Wang Kun, Yin Zhong-hai, Zhou Li-hua, Cai Zhen. Study on Information System Disaster Recovery Planning[J]. Journal of Electronics & Information Technology, 2007, 29(4): 776-780. doi: 10.3724/SP.J.1146.2005.01684
Citation: Wang Kun, Yin Zhong-hai, Zhou Li-hua, Cai Zhen. Study on Information System Disaster Recovery Planning[J]. Journal of Electronics & Information Technology, 2007, 29(4): 776-780. doi: 10.3724/SP.J.1146.2005.01684

信息系统灾难恢复计划研究

doi: 10.3724/SP.J.1146.2005.01684
基金项目: 

国家十五重点科技攻关计划(2002AA1Z67101)资助课题

Study on Information System Disaster Recovery Planning

  • 摘要: 灾难发生时,需要有量化的、精确的方法从多个子灾难恢复计划中选择最优集合实现灾难恢复。该文采用最优化理论提出一个灾难恢复计划数学模型。模型表示系统中不同应用、设施、资源、子灾难恢复计划、预算等以及它们之间的关系,对资源进行分类,解决不同子灾难恢复计划之间的冲突。模型具有较少的主观参数,以实现客观评价灾难恢复计划,易于对灾难恢复计划进行精确、量化的分析。论文给出了模型的实施步骤与模型分析,实验验证了模型的正确性。
  • [1] Petroski H. Technology and architecture in an age of terrorism[J].Technology in Society.2004, 26(2-3):161-167 [2] Anon. Blackouts. Threat of terrorism spur disaster recovery planning[J]. International Journal of Micrographics and Optical Technology, 2003, 21(4-5): 2-2. [3] Wang K, Su R D, and Li Z X, et al.. Robust disaster recovery system model[J].Wuhan University Journal of Natural Sciences.2006, 11(1):170-174 [4] Chow W S. Success factors for IS disaster recovery planning in Hong Kong[J].Information Management and Computer Security.2000, 8(2):80-86 [5] Smith D R, Cybrowski W J, and Zawislan F, et al.. Contingency/disaster recovery planning for transmission systems of the defense information system networks[J].IEEE Journal on Selected Areas in Communications.1994, 12(1):13-22 [6] Hayes P E and Hammons A. Disaster recovery project management[C]. Proceedings of IEEE 47th Petroleum and Chemical Industry Conference, San Antonio, TX, USA, 2000: 55-63. [7] Lam W. Ensuring business continuity[J]. IT Professional, 2002, 4(3): 19-25. [8] Uddin N and Engi D. Disaster management system for southwestern Indiana[J].Natural Hazards Review.2002, 3(1):19-30 [9] Fallara P. Disaster recovery planning[J]. IEEE Potentials, 2004, 22(5): 42-44. [10] Hawkins S M, Yen D C, and Chou D C. Disaster recovery planning: A strategy for data security[J].Information Management and Computer Security.2000, 8(5):222-229 [11] Corley J and Lejerskar D. Homeland defense center network-capitalizing on simulation modeling and visualization for emergency preparedness response and mitigation[C]. Proceedings of the 2003 Winter Simulation Conference: Driving Innovation, Piscataway, NJ, USA, 2003: 1061-1067.
  • 加载中
计量
  • 文章访问数:  3338
  • HTML全文浏览量:  82
  • PDF下载量:  1094
  • 被引次数: 0
出版历程
  • 收稿日期:  2005-12-26
  • 修回日期:  2006-06-30
  • 刊出日期:  2007-04-19

目录

    /

    返回文章
    返回