[1] |
GRüNBAUER J , HOLLMANN H , JüRJENS J ,et al. Modelling and verification of layered security protocols:a bank application[C]// International Conference on Computer Safety. 2003.
|
[2] |
CIGRE Task Force 38.03.12.Power system security assessment:a position paper[J]. Electra, 1997,(175): 49-77.
|
[3] |
XIAO F , MCCALLEY J D . Risk-based security and economy tradeoff analysis for real-time operation[J]. IEEE Transactions on Power Systems, 2007,22(4): 2287-2288.
|
[4] |
YANG Y , WU L , YIN G ,et al. A Survey on security and privacy issues in Internet of things[J]. IEEE Internet of Things Journal, 2017,4(5): 1250-1258.
|
[5] |
ASPINALL D , WOLTERS M . POSTER:weighing in eHealth security[C]// Sigsac Conference on Computer and Communications Security. 2016: 1832-1834.
|
[6] |
YANG LEI , HUMAYED A , LI FENGJUN . A multi-cloud based privacy-preserving data publishing scheme for the Internet of things[C]// Conference on Computer Security Applications. 2016: 30-39.
|
[7] |
赵庆兰 . 一种基于 CC 的网络安全评估模型[J]. 计算机安全, 2008(3): 42-43.
|
|
ZHAO Q L . A network security evaluation model based on CC[J]. Computer Security, 2008(3): 42-43.
|
[8] |
陈勇, 莫玮, 王勇 ,等. 一种基于 CC 的智能电视应用软件安全评估方法[J]. 电视技术, 2014,38(8): 72-74+82.
|
|
CHEN Y , MO W , WANG Y ,et al. Security assessment method of smart TV’s application based on CC[J]. Video Engineering, 2014,38(8): 72-74.
|
[9] |
YANG Y H , SHEN Y J , ZHANG G D ,et al. The grading scheme based on fuzzy comprehensive evaluation and analytic hierarchy process for classified protection of information system[C]// 5th IEEE International Conference on Software Engineering and Service Science (ICSESS). 2014.
|
[10] |
赵艳玲 . 浅谈美国《提升关键基础设施网络安全框架》[J]. 信息安全与通信保密, 2015(5): 16-21.
|
|
ZHAO Y L . Brief probe into “Framework for improving critical infrastructure cybersecurity”[J]. Information Security and Communications Privacy, 2015(5): 16-21.
|
[11] |
逄淑宁, 封莎 . 信息技术安全评估通用准则CC综述[J]. 电信网技术, 2011(8): 59-63.
|
|
FENG S N , FENG S . Review on information technology security assessment common criteria CC[J]. Information and Communications Technology and Policy, 2011(8): 59-63.
|
[12] |
张秋瑾 . 云计算隐私安全风险评估[D]. 昆明:云南大学, 2015.
|
|
ZHANG Q J . Cloud computing privacy security risk assessment[D]. Kunming:Yunnan University, 2015.
|
[13] |
PANG H M , LIU H Z . Research on information engineering security surveillance risk assessment based on page rank algorithm[J]. Computer Security, 2014(8): 17-20.
|
[14] |
郑改成 . 基于物联网下的智慧医疗体系架构及其应用[J]. 山西电子技术, 2016(5): 66-68.
|
|
ZHENG G C . Architecture and application of the smart healthcare based on Internet of things[J]. Shanxi Electronic Technology, 2016(5): 66-68.
|
[15] |
张玉清, 周威, 彭安妮 . 物联网安全综述[J]. 计算机研究与发展, 2017,54(10): 2130-2143.
|
|
ZHANG Y Q , ZHOU W , PENG A N . Survey of Internet of things security[J]. Journal of Computer Research and Development, 2017,54(10): 2130-2143.
|
[16] |
杨颖, 朱君茹, 袁媛 ,等. 医疗物联网的发展现状、问题与对策[J]. 中国卫生信息管理杂志, 2015(3): 298-303.
|
|
YANG Y , ZHU J R , YUAN Y ,et al. Development status,problems and countermeasures of medical Internet of things[J]. Chinese Journal of Health Informatics and Management, 2015(3): 298-303.
|