Shnitko A. Adaptive security in complex information systems[C]. Proceedings of the 7th Korea-Russia International Symposium on Science and Technology, Ulsan, South Korea, 2003: 206-210.[2]李守鹏, 孙红波. 信息系统安全模型研究[J]. 电子学报, 2003, 31(10): 1491-1495.[3]Zhou B Y. Security analysis and the DSM model[C]. Proceedings of 13th International Workshop on Database and Expert Systems Applications, Aix-en-Provence, France, 2002: 17-21.[4]Hripcsak G. IAIMS Architecture[J]. Journal of the American Medical Informatics Association, 1997, 4(2): S20-S30.[5]Lee S Y and Koh J S. WWW-based reliability information system[J].Computers Industrial Engineering.1998, 35(3 4):599-602[6]Chou S C T. Migrating to the web: A web financial information system server[J].Decision Support Systems.1998, 23(1):29-40[7]Van R and de Velde. Framework for a clinical information system[J].International Journal of Medical Informatics.2000, 57(1):57-72[8][8] XML在电子政务中的应用指南[S]. 2005, GB/Z 19669-2005.[9][9] 信息技术设备的安全[S]. 2001, GB 4943-2001.[10][10] 路由器安全技术要求[S]. 1999, GB/T 18018-1999.[11][11] 信息技术包过滤防火墙安全技术要求[S]. 1999, GB/T 18019-1999.[12][12] 信息技术应用级防火墙安全技术要求[S]. 1999, GB/T 18020-1999.[13]朱鲁华, 施军, 沈昌祥. 涉密网的物理隔离问题[J]. 电子计算机, 2002, 154: 16-19.[14]Wang K, Su R D, and Li Z X, et al.. Robust disaster recovery system model[J].Wuhan University Journal of Natural Sciences.2006, 11(1):170-174[15]Grimaila M R. Maximizing business information security's educational value[J].IEEE Security Privacy Magazine.2004, 2(1):56-60[16]刘权. 我国电子政务发展现状与趋势[J]. 中国信息导报, 2004, 12: 21-23.
|