The survey of information system security classified protection

被引:0
|
作者
Tian, Zhihong [1 ]
Wang, Bailing [1 ]
Ye, Zhiwei [1 ]
Zhang, Hongli [1 ]
机构
[1] Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology Haerbin, Heilongjiang Province, China
关键词
Information use - Information systems;
D O I
暂无
中图分类号
学科分类号
摘要
Information security has become very important in most organizations. The state has carried out classified protection system to safeguard the information system. This article discussed the classified protection of information security criteria and technological essentials in the implementation for classified security protection. © Springer-Verlag Berlin Heidelberg 2011.
引用
收藏
页码:975 / 980
相关论文
共 50 条
  • [31] Security Assessment of Blockchain in Chinese Classified Protection of Cybersecurity
    Wang, Di
    Zhu, Yan
    Zhang, Yi
    Liu, Guowei
    IEEE ACCESS, 2020, 8 (08): : 203440 - 203456
  • [32] Accord concerning classified information protection and exchange
    Sourgens, E
    ESA BULLETIN-EUROPEAN SPACE AGENCY, 2002, (112) : 76 - 78
  • [33] Survey on Information System Security Risk Management alignment
    Abbass, Wissam
    Baina, Amine
    Bellafkih, Mostafa
    2016 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY FOR ORGANIZATIONS DEVELOPMENT (IT4OD), 2016,
  • [34] Survey of information security
    Shen ChangXiang
    Zhang HuangGuo
    Feng Dengguo
    Cao Zhenfu
    Huang Jiwu
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2007, 50 (03): : 273 - 298
  • [35] Survey of information security
    ChangXiang Shen
    HuangGuo Zhang
    DengGuo Feng
    ZhenFu Cao
    JiWu Huang
    Science in China Series F: Information Sciences, 2007, 50 : 273 - 298
  • [36] Survey of information security
    SHEN ChangXiang1
    2 School of Computer
    3 Institute of Software
    5 Information Technology Institute
    Science in China(Series F:Information Sciences), 2007, (03) : 273 - 298
  • [37] Context information based cyber security defense of protection system
    Su, Sheng
    Duan, Xianzhong
    Zeng, Xiangjun
    Chan, W. L.
    Li, K. K.
    2007 IEEE POWER ENGINEERING SOCIETY GENERAL MEETING, VOLS 1-10, 2007, : 294 - 294
  • [38] Research on Network Security Management and Protection Technology of Information System
    Xu, Raoshan
    INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY AND ENVIRONMENT PROTECTION (ICSEEP 2015), 2015, : 1036 - 1042
  • [39] Research on Information Security Protection Technology of Client Side System
    Yang, Bin
    Shao, Xuesong
    Zheng, Hongjuan
    Gu, Linlin
    Sun, Jize
    2020 CHINESE AUTOMATION CONGRESS (CAC 2020), 2020, : 4359 - 4364
  • [40] The Evaluation Model of the Security Classified Protection Based on the Evidence Theory
    Qin, Zhi
    Zhang, Shibin
    PROCEEDINGS OF 2010 ASIA-PACIFIC YOUTH CONFERENCE ON COMMUNICATION, VOLS 1 AND 2, 2010, : 430 - 434