Computer Science ›› 2007, Vol. 34 ›› Issue (10): 309-310.
Previous Articles
HUANG Qin, ZHANG Yue-Qin ,LIU Yi-Liang (Automation School, Chongqing University, Chongqing 400030)
Online:
Published:
Abstract: Information system has been used in every walk of life and its security has nearly been noticed. The risk evaluation which can analyze the current status and potential risk of information system provide gist and direction for later security programming, m
Key words: Risk evaluation, Modularization, Hiberarehy
HUANG Qin, ZHANG Yue-Qin ,LIU Yi-Liang (Automation School, Chongqing University, Chongqing 400030). [J].Computer Science, 2007, 34(10): 309-310.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2007/V34/I10/309
Cited