1. Wang L, Liu L, You W J. Knowledge portal construction and resources integration for hydropower corporation. Proceedings of 1st IFIP International Conference on Research and Practical Issues of Enterprise Information Systems, Apr, 2006, Vienna, Austria, 2006: 531-540
2. BS7799. Information security management specification for information security management systems. 1999
3. ISO/ICE17799. Information technology-code of practice for information security management. 2000
4. McCumber J. Information systems security: a comprehensive model. Proceedings 14th National Computer Security Conference, Oct 1-4, 1991, Washington, DC, USA. New York, NY, USA: ACM, 1991: 124-129
5. Maconachy W V, Schou C D, Ragsdale D, et al. A model for information security assurance: An integrated approach. Proceedings of the 2001 IEEE Workshop on Information Security Assurance and Security, Jun 5-6, 2001, West Point, NY, USA. 2001: 306-310
6. Li Ling-juan, Shen Ling-tong. An improved multilevel fuzzy performance comprehensive evaluation algorithm for security The Journal of China Universities of Posts and Telecommuni- cations, 2006, 13(4): 48-53
7. Tang Guang-hua, Tian Tian, Hao Bin. A study on the incremental value-relevance of fundamental information. The Transaction of Zhongshan University: Social Science Edition, 2006, 46 (2): 105-109 (in Chinese)
8. Chen Bing, Wang Li-song. Research on architecture of network security. Computer Engineering and Application, 2002, 38 (7): 138-140 (in Chinese)
9. Su Xiang, Zheng Jian-ming, Wu Pei. Research on information life cycle management. Information Science, 2006, 24 (5): 691-696 (in Chinee) |