Security evaluation model of the information system based on the security characteristic measure for the key

Author(s):  
Ou Qingyu ◽  
Zhou Dawei
2019 ◽  
Vol 161 ◽  
pp. 1199-1205 ◽  
Author(s):  
Nur Azimah bt Mohd ◽  
Zarul Fitri Zaaba

2014 ◽  
Vol 686 ◽  
pp. 458-462
Author(s):  
Zi Yan Shi ◽  
Guo Lin Zhao ◽  
Qiao Lin Hu

The security evaluation for an information network system is an important management tool to insure its normal operation. We must realize the significance of the comprehensive network security risks. A network evaluation model and the algorithm are presented and adapt the hierarchical method to characterize the security risk situation. The evaluation method is used to evaluate the key nodes and the mathematics is used to analyze the whole network security situation. Compared with others, the method can automatically create a rule-based security evaluation model to evaluate the security threat from the individual security elements and the combination of security elements, and then evaluation the network situation. It is shown that this system provides a valuable model and algorithms to help to find the security rules, adjust the security measure, improve the security performance and design the appropriate security risk evaluation and management tools.


2014 ◽  
Vol 602-605 ◽  
pp. 3379-3383
Author(s):  
Yong Sheng Liu ◽  
Zan Zhang

In multiattribute decision making, it is critical to indentify the importance degree of attributes before the overall assessment of the alternatives. In this paper, we give a measurement of importance degree of attributes based on knowledge discovery in the decision information system, which satisfies the conditions of fuzzy measure. Further, we construct an evaluation model combined Choquet integral with the importance degree measure. The case study illustrates the validity and the effectiveness of the method.


Sign in / Sign up

Export Citation Format

Share Document