Please wait a minute...
档案学研究  2013, Vol. 27 Issue (1): 71-75    DOI: 10.16065/j.cnki.issn1002-1620.2013.01.017
档案信息化     
电子档案数据的易损性评估
刘嘉佳1, 孙雅静2, 杜牧野1
1 国防科学技术大学 长沙 410073
2 解放军干部档案室 北京 100000
Vulnerability Assessment and Management of Digital Archives
Jiajia Liu
National University of Defense Technology, Changsha, 410073
 全文: PDF  HTML
摘要:

讨论了以破坏模式及影响分析表为基础的一般易损性评估方法应用于电子档案的数据易损性评估时遇到的问题,提出了改进的方法:以数据为中心的易损性评估方法,即改造破坏模式及影响分析表,通过为电子档案数据分配“关键”值属性集,并预先为档案数据易损性打分排序的电子档案数据易损性评估方法。解决了电子档案数据易损性评估的实时性需求等问题。

Abstract:

The limitation of just using a normal vulnerability assessment method based on damage effect model analysis(DMEA)table to assess the digital archives’ vulnerability is discussed in this paper. Following the discussion a data-centric approach is advanced to fix the problem. In detail, the new method is implemented mainly through assigning a “key” value to the digital archives data, then prioritizing the data, and finally completing the data vulnerability assessment associating with the DMEA or FEMA table.

出版日期: 2017-11-28
服务  
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章  

引用本文:

刘嘉佳, 孙雅静, 杜牧野. 电子档案数据的易损性评估[J]. 档案学研究, 2013, 27(1): 71-75.

Jiajia Liu. Vulnerability Assessment and Management of Digital Archives. Archives Science Study, 2013, 27(1): 71-75.

链接本文:

http://daxyj.idangan.cn/CN/10.16065/j.cnki.issn1002-1620.2013.01.017        http://daxyj.idangan.cn/CN/Y2013/V27/I1/71

[1] 吕大刚等.基于可靠度和性能的结构整体地震易损性分析[J],自然灾害学报,2006(2).
[2] Bruce A.Bowman,James F.Sullivan, Educating Engineers:Information Vulnerabilities and Security[J],J.Profl.Issues in Engrg.Educ.and Pract,Vol.126,No.1,2000(5).
[3] Gregory Levitin,Kjell Hausken,Data survivability vs. security in information systems[J],Reliability Engineering & System Safety,2012.10,Vol.100.
[4] Chen Chung-wei, Tsai Yuh-ren, Location Privacy in Unattended Wireless Sensor Networks upon the Requirement of Data Survivability[J], IEEE Journal on Selected Areas in Communications .Vol.29,No.7.2011,11.
[5] Brenda Huettner,Digital Risk Management:Protecting Your Privacy,Improving Security,and Preparing for Emergencies[C],International Professional Communication Conference, 2006 IEEE,P136-P138.
[6] D.Smith,The Cost of Lost Data[C],Graziado Business Report.Vol.6,No.3,2003.
[7] 冯惠玲,张辑哲.档案学概论[M].北京:中国人民大学出版社,2006.
No related articles found!