A New Risk Assessment Quantitative Method Based on Fuzzy AHP

被引:0
作者
Wang Lijian [1 ]
Wang Bin [2 ]
Peng Yongjun [3 ]
机构
[1] Wuhan Univ, Sch Comp, Wuhan 430072, Peoples R China
[2] Elect Engn Inst PLA, Hefei 230037, Peoples R China
[3] Commun Command Acad PLA, Wuhan 430010, Peoples R China
来源
2010 2ND IEEE INTERNATIONAL CONFERENCE ON INFORMATION AND FINANCIAL ENGINEERING (ICIFE) | 2010年
关键词
information security; risk assessment; Fuzzy Comprehensive Evaluation; AHP;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
with the development of the country and the acceleration of information technology, the information security issues is highly growing. In order to efficiently evaluate the information security risk, the information system security risk assessment model based on Fuzzy AHP method is proposed. In this paper, firstly, we use multi-layer structure and elation matrix is introduced to describe the interrelationship among judgment factors. Secondly, on the basis of calculating the influence of factors on security, a new risk assessment quantitative method is established. Finally, certain method is raised to analyze the results from fuzzy judgment. The method changes the ways of generally regarding information security as black box to evaluation security, and plays a role in verifying and modifying the results made by traditional model.
引用
收藏
页码:822 / 826
页数:5
相关论文
共 13 条
[1]  
Anwar M.M., 2007, INT C EL ENG 2007 IC, P1, DOI DOI 10.1109/ICEE.2007.4287288
[2]   Information Security Risk Assessment in Healthcare: the Experience of an Italian Paediatric Hospital [J].
Bava, Michele ;
Cacciari, Domenico ;
Sossa, Edoardo ;
Zotti, Daniel ;
Zangrando, Riccardo .
2009 1ST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS(CICSYN 2009), 2009, :321-+
[3]  
Cao J, 2004, INT C COMP SUPP COOP, P563
[4]  
Cheng XY, 2006, PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, P3573
[5]   Ontology-based Decision Support for Information Security Risk Management [J].
Ekelhart, Andreas ;
Fenz, Stefan ;
Neubauer, Thomas .
2009 FOURTH INTERNATIONAL CONFERENCE ON SYSTEMS (ICONS), 2009, :80-+
[6]   An inclusive information society needs a global approach of information security [J].
Ghernaouti-Helie, Solange .
2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, :658-662
[7]   Integrating information security engineering with system engineering with system engineering tools [J].
Higginbotham, MD ;
Maley, JG ;
Milheizler, AJ ;
Suskie, BJ .
SEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WET ICE '98), 1998, :320-326
[8]  
Kajava J., 2006, IEEE. ss, P2091
[9]   Study on Information Security of Industry Management [J].
Li Xuemei ;
Li Yan ;
Ding Lixing .
2009 ASIA-PACIFIC CONFERENCE ON INFORMATION PROCESSING (APCIP 2009), VOL 1, PROCEEDINGS, 2009, :522-+
[10]  
Peng W, 2009, INT C COMP AID IND D, P1, DOI [10.1109/CAIDCD.2009.5375185, 10.1109/PLASMA.2009.5227264]