IHEP OpenIR  > 计算中心
Survivability computation of networked information systems
Lin, XG; Xu RS(许榕生); Xu, RS; Zhu, ML
2005
发表期刊COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS
卷号3802页码:407-414
通讯作者Zhejiang Univ, Inst Artificial Intelligence, Hangzhou 310027, Peoples R China ; CAS, Inst High Energy Phys, Beijing 100049, Peoples R China
文章类型Article; Proceedings Paper
摘要Survivability should be considered beyond security for networked information systems, which emphasizes the ability of continuing providing services timely in malicious environment. As an open complex system, networked information system is presented by a service-oriented hierarchical structure, and fault scenarios are thought of as stimulations that environment impact on systems while changes of system services' performance as system reaction. Survivability test is done according to a test scheme which is composed of events, atomic missions, fault scenarios and services. Survivability is computed layer by layer based on the result of survivability test through three specifications (resistance, recognition and recovery). This computation method is more practicable than traditional state-based method for it converts direct defining system states and computing state transition into a layered computation process.
学科领域Computer Science
研究领域[WOS]Computer Science ; Computer Science
URL查看原文
语种英语
研究领域[WOS]Computer Science ; Computer Science
WOS类目Computer Science, Artificial Intelligence ; Computer Science, Information Systems ; Computer Science, Theory & Methods
WOS记录号WOS:000234874900059
引用统计
文献类型期刊论文
条目标识符http://ir.ihep.ac.cn/handle/311005/237356
专题计算中心
作者单位中国科学院高能物理研究所
推荐引用方式
GB/T 7714
Lin, XG,Xu RS,Xu, RS,et al. Survivability computation of networked information systems[J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS,2005,3802:407-414.
APA Lin, XG,许榕生,Xu, RS,&Zhu, ML.(2005).Survivability computation of networked information systems.COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS,3802,407-414.
MLA Lin, XG,et al."Survivability computation of networked information systems".COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS 3802(2005):407-414.
条目包含的文件
文件名称/大小 文献类型 版本类型 开放类型 使用许可
3801.pdf(251KB)期刊论文作者接受稿限制开放CC BY-NC-SA请求全文
个性服务
推荐该条目
保存到收藏夹
查看访问统计
导出为Endnote文件
谷歌学术
谷歌学术中相似的文章
[Lin, XG]的文章
[许榕生]的文章
[Xu, RS]的文章
百度学术
百度学术中相似的文章
[Lin, XG]的文章
[许榕生]的文章
[Xu, RS]的文章
必应学术
必应学术中相似的文章
[Lin, XG]的文章
[许榕生]的文章
[Xu, RS]的文章
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。