• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2006, Vol. 28 ›› Issue (2): 16-19.

• 论文 • Previous Articles     Next Articles

  

  • Online:2006-02-01 Published:2010-05-20

Abstract:

For the inconsistency in the management information model of network vulnerability scanner systems, this article analyzes and induces their functions. According to the analysis, we present a CIM(Common Information Model) management information model, and explains the method to convert the CIM manage ement information model to IDL (Interface Definition Language) components in CORBA. The modeling method in this article is universal and practical in engineering.

Key words: network vulnerability scanner, modeling, CIM, CORBA