Ghosh A. K., McGraw G. An Approach for Certifying Security in Software Components[A]. 21st NIST-NCSC National Information Systems Security Conference[C]. Virginia: NIST Press, 1998. 42-48.
[2]
Guo Daifei. Design of Secure Distributed Intrusion Detection Systems[J]. The Journal of China Universities of Posts and Telecommunica- tions, 2002, 9(2): 17-24.
[3]
Weissman C. Penetration Testing. Technical report, Naval Research Laboratory, January 1995. NRL Technical Memorandum 5540:082A.
Chai Pingxuan, Gong Xiangyang, Cheng Shiduan. Research on Distributed Intrusion Detection[J]. Journal of Beijing University of Posts and Telecommunications, 2002, 25(2): 68-73.
[6]
Peter Herrmann, Heiko Krumm. Object-oriented Security Analysis and Modeling[A]. 9th International Conference on Telecommunication Systems – Modelling and Analysis[C]. USA: Dallas: IFIP, 2001. 21-32.
[7]
Bramlage J. L. A New Paradigm For Performing Risk Assessment[A]. 20th National Information Systems Security Conference[C]. Baltimore:1997. 565-576.
[8]
Olivier MS, Solms SH von . An Object-based Version of the Path Context Model[J]. International Journal of Computer Mathematics, 1993, 49(3): 133-144
[9]
Bruce Barnett. NOOSE: Networked Object Oriented Security Examiner[A]. 14th Systems Administration Conference (LISA 2000)[C]. New Orleans: 2000. 369-378