欢迎来到天天文库
浏览记录
ID:1080692
大小:1.75 MB
页数:42页
时间:2017-11-07
《gat387-2002 计算机信息系统安全等级保护网络技术要求》由会员上传分享,免费在线阅读,更多相关内容在行业资料-天天文库。
1、ICs35.020[.09N.1中华人民共和国公共安全行业标准GA/T387-2002计算机信息系统安全等级保护网络技术要求Networktechnologyrequirementincomputerinformationsystemclassifiedsecurityprotection2002一07门5发布2002一07一15实施中华人民共和国公安部发布GA/T387-2002目次份班前言引言1范围·······································································
2、······································。···一12规范性引用文件································································································⋯⋯13术语和定义··························。··············,···················································.···.·.·.⋯⋯14网络安全组成与相互关系
3、·,················································································。⋯⋯15网络基本安全技术························································································。····⋯⋯25.1身份鉴别····························,···············································
4、··························⋯⋯25.1.1用户标识·············································。·····················································⋯⋯25.1.2用户鉴别··········,·····················································································。··⋯⋯35.1.3用户一主体绑定···········
5、··················································································⋯⋯35.1.4鉴别失败处理·······················································································......⋯⋯35.2自主访问控制·················································。·······················
6、·······················⋯⋯35.2.1访问控制策略·····································。···················································。···⋯⋯35.2.2访问控制功能···········································。·················································⋯⋯35.3标记········,·,··················
7、···············································································⋯⋯35.3.1主体标记···································································································⋯⋯35.3.2客体标记····。···································································
8、···························⋯⋯35.3.3标记完整性··········································
此文档下载收益归作者所有