[1] 周逸峰.金融机构信息系统安全架构规划和建设[D].上海:复旦大学,2014
[2] Aroms E. NIST Special Publication 800-53 Revision 3 Recommended Security Controls for Federal Information Systems and Organizations[M].Scotts Valley, California, US: CreateSpace, 2012
[3] 佚名.工信部将出台国家信息安全战略[J]. 工具技术, 2013(1):76-76
[4] 佚名. GB/T 22080-2008《信息技术 安全技术 信息安全管理体系要求》概要[J]. 信息技术与标准化, 2009(9):37-39.
[5] Chair-M P, Ller H A, Program Chair-Onut V. Proceedings of the 26th Annual International Conference on Computer Science and Software Engineering[C]// Proc of International Conference on Computer Science and Software Engineering. IBM Corp. 2016.
[6] 杨婕. 基于顶层设计思路的企业安全架构总体设计[J]. 信息通信, 2017(7):249-251.
[7] 罗革新, 吕增江, 崔广印,等. 大型企业信息安全体系架构设计初探[J]. 勘探地球物理进展, 2008, 31(6):471-478.
[8] 胡云强,谢宗晓.企业信息安全规划方法及其介绍[J].大众用电,2017(S1):98-102
[9] 春增军. 核电企业信息安全管理与保障研究[D].武汉:武汉大学,2013
[10]Bahmani F, Shariati M, Shams F. A survey of interoperability in Enterprise Information Security Architecture frameworks[C]// Proc of International Conference on Information Science and Engineering. IEEE, 2010:1794-1797
[11] 吴海燕, 于文轩. 基于企业架构的大学信息安全架构初探[C]// 中国高等教育学会教育信息化分会第十一次学术年会. 2012.
[12] Rachamadugu V, Anderson J A. Managing Security and Privacy Integration across Enterprise Business Process and Infrastructure[C]// Proc of IEEE International Conference on Services Computing. IEEE Computer Society, 2008:351-358
[13] Korhonen J J, Yildiz M, Mykkänen J. Governance of Information Security Elements in Service-Oriented Enterprise Architecture[C]//Proc of International Symposium on Pervasive Systems, Algorithms, and Networks. IEEE, 2009:768-773.
[14] Sun J, Chen Y. Intelligent Enterprise Information Security Architecture Based on Service Oriented Architecture[C]// Proc of International Seminar on Future Information Technology and Management Engineering. IEEE, 2008:196-200
[15] Group T O. Open group architecture framework TOGAF version 9[J]. 2010