Generalized dominance-based rough set approach to security evaluation with imprecise information

被引:0
|
作者
Zhao L. [1 ]
Xue Z. [1 ]
机构
[1] School of Electronic and Electric Engineering, Shanghai Jiaotong University
关键词
Generalized dominance-based rough set approach (G-DRSA); Grey number; Multi-attribute group decision-making (MAGDM); Security evaluation;
D O I
10.3772/j.issn.1006-6748.2010.03.006
中图分类号
学科分类号
摘要
The model of grey multi-attribute group decision-making (MAGDM) is studied, in which the attribute values are grey numbers. Based on the generalized dominance-based rough set approach (G-DRSA), a synthetic security evaluation method is presented. With the grey MAGDM security evaluation model as its foundation, the extension of technique for order performance by similarity to ideal solution (TOPSIS) integrates the evaluation of each decision-maker (DM) into a group's consensus and obtains the expected evaluation results of information system. Via the quality of sorting (QoS) of G-DRSA, the inherent information hidden in data is uncovered, and the security attribute weight and DMs' weight are rationally obtained. Taking the computer networks in a certain university as objects, the example illustrates that this method can effectively remove the bottleneck of the grey MAGDM model and has practical significance in the synthetic security evaluation. © by High Technology Letters Press.
引用
收藏
页码:254 / 262
页数:8
相关论文
共 6 条
  • [1] A security evaluation approach for information systems in telecommunication enterprises
    Yan, Qiang
    ENTERPRISE INFORMATION SYSTEMS, 2008, 2 (03) : 309 - 324
  • [2] Cryptosystem Security Evaluation Based on Diagonal Game and Information Theory
    Sadkhan, Sattar B.
    Reda, Dhilal M.
    2018 INTERNATIONAL CONFERENCE ON ENGINEERING TECHNOLOGY AND THEIR APPLICATIONS (IICETA), 2018, : 118 - 123
  • [3] A Security Evaluation Model for Edge Information Systems Based on Index Screening
    Guo, Ziyu
    Qi, Jiahao
    Zuo, Jinxin
    Xie, Weixuan
    Lu, Yueming
    Tian, Huiping
    Cao, Ruohan
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (12): : 21585 - 21603
  • [4] An Object-Oriented Information System Security Evaluation Method Based on Security Level Distinguishing Model
    Xu Cuihua
    Lin Jiajun
    WISM: 2009 INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, : 497 - 500
  • [5] Quantitative Evaluation of Software Security: An Approach Based on UML/SecAM and Evidence Theory
    Sedaghatbaf, Ali
    Azgomi, Mohammad Abdollahi
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 8 (02): : 141 - 153
  • [6] A Flexible Risk-Based Security Evaluation Methodology for Information Communication Technology System Certification
    Matheu, Sara N.
    Martinez-Gil, Juan F.
    Bicchierai, Irene
    Marchel, Jan
    Piliszek, Radoslaw
    Skarmeta, Antonio
    APPLIED SCIENCES-BASEL, 2025, 15 (03):