档案信息化 |
|
|
|
|
电子档案数据的易损性评估 |
刘嘉佳1, 孙雅静2, 杜牧野1 |
1 国防科学技术大学 长沙 410073 2 解放军干部档案室 北京 100000 |
|
Vulnerability Assessment and Management of Digital Archives |
Jiajia Liu |
National University of Defense Technology, Changsha, 410073 |
[1] | 吕大刚等.基于可靠度和性能的结构整体地震易损性分析[J],自然灾害学报,2006(2). | [2] | Bruce A.Bowman,James F.Sullivan, Educating Engineers:Information Vulnerabilities and Security[J],J.Profl.Issues in Engrg.Educ.and Pract,Vol.126,No.1,2000(5). | [3] | Gregory Levitin,Kjell Hausken,Data survivability vs. security in information systems[J],Reliability Engineering & System Safety,2012.10,Vol.100. | [4] | Chen Chung-wei, Tsai Yuh-ren, Location Privacy in Unattended Wireless Sensor Networks upon the Requirement of Data Survivability[J], IEEE Journal on Selected Areas in Communications .Vol.29,No.7.2011,11. | [5] | Brenda Huettner,Digital Risk Management:Protecting Your Privacy,Improving Security,and Preparing for Emergencies[C],International Professional Communication Conference, 2006 IEEE,P136-P138. | [6] | D.Smith,The Cost of Lost Data[C],Graziado Business Report.Vol.6,No.3,2003. | [7] | 冯惠玲,张辑哲.档案学概论[M].北京:中国人民大学出版社,2006. |
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|