Architecture of vulnerability discovery technique for information systems
First,the definition of technical terms about vulnerability discovery were presented.The characters of the targets of vulnerability discovery were Analyzed.The general process of vulnerability discovery was studied.Then,by applying layer construction model way,proposed the architecture construction...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2011-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74419920/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537787483914240 |
---|---|
author | ZHANG You-chun1 WEI Qiang2 LIU Zeng-liang3 ZHOU Ying4 |
author_facet | ZHANG You-chun1 WEI Qiang2 LIU Zeng-liang3 ZHOU Ying4 |
author_sort | ZHANG You-chun1 |
collection | DOAJ |
description | First,the definition of technical terms about vulnerability discovery were presented.The characters of the targets of vulnerability discovery were Analyzed.The general process of vulnerability discovery was studied.Then,by applying layer construction model way,proposed the architecture construction model of vulnerability discovery technique,which was divided into five layers,and also explained the contents,roles and key techniques of each layer.Finally,the future direction for the technique is that a comprehensive and coordinated method is used,with all the five layers taken into consideration. |
format | Article |
id | doaj-art-5888d0ea05b94e16b8c27ad0f9ed79dc |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2011-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-5888d0ea05b94e16b8c27ad0f9ed79dc2025-01-14T08:22:57ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2011-01-0132424774419920Architecture of vulnerability discovery technique for information systemsZHANG You-chun1WEI Qiang2LIU Zeng-liang3ZHOU Ying4First,the definition of technical terms about vulnerability discovery were presented.The characters of the targets of vulnerability discovery were Analyzed.The general process of vulnerability discovery was studied.Then,by applying layer construction model way,proposed the architecture construction model of vulnerability discovery technique,which was divided into five layers,and also explained the contents,roles and key techniques of each layer.Finally,the future direction for the technique is that a comprehensive and coordinated method is used,with all the five layers taken into consideration.http://www.joconline.com.cn/zh/article/74419920/information systemvulnerability discoverytargets objectarchitecture constructionkey technique |
spellingShingle | ZHANG You-chun1 WEI Qiang2 LIU Zeng-liang3 ZHOU Ying4 Architecture of vulnerability discovery technique for information systems Tongxin xuebao information system vulnerability discovery targets object architecture construction key technique |
title | Architecture of vulnerability discovery technique for information systems |
title_full | Architecture of vulnerability discovery technique for information systems |
title_fullStr | Architecture of vulnerability discovery technique for information systems |
title_full_unstemmed | Architecture of vulnerability discovery technique for information systems |
title_short | Architecture of vulnerability discovery technique for information systems |
title_sort | architecture of vulnerability discovery technique for information systems |
topic | information system vulnerability discovery targets object architecture construction key technique |
url | http://www.joconline.com.cn/zh/article/74419920/ |
work_keys_str_mv | AT zhangyouchun1 architectureofvulnerabilitydiscoverytechniqueforinformationsystems AT weiqiang2 architectureofvulnerabilitydiscoverytechniqueforinformationsystems AT liuzengliang3 architectureofvulnerabilitydiscoverytechniqueforinformationsystems AT zhouying4 architectureofvulnerabilitydiscoverytechniqueforinformationsystems |