A new information security risk analysis method based on membership degree

被引:4
作者
Chen, Jiqang [1 ]
Pedrycz, Witold [2 ,3 ,4 ]
Ma, Litao [1 ]
Wang, Chao [5 ]
机构
[1] Hebei Univ Engn, Sch Sci, Handan, Peoples R China
[2] Univ Alberta, Dept Elect & Comp Engn, Edmonton, AB, Canada
[3] King Abdulaziz Univ, Fac Engn, Dept Elect & Comp Engn, Jeddah 21413, Saudi Arabia
[4] Polish Acad Sci, Syst Res Inst, PL-01447 Warsaw, Poland
[5] Hebei Univ Engn, Sch Econ & Management, Handan, Peoples R China
基金
中国国家自然科学基金;
关键词
Risk analysis; Information security; Ecological environment assessment; Membership degree and discriminatory weights; S FUZZY-SYSTEMS; STABILIZATION CONDITIONS; PROTOCOLS;
D O I
10.1108/K-10-2013-0235
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose - In a risk analysis system, different underlying indices often play different roles in identifying the risk scale of the total target in a system, so a concept of discriminatory weight is introduced first. With the help of discriminatory weight and membership functions, a new method for information security risk analysis is proposed. The purpose of this paper is to discuss the above issues. Design/methodology/approach - First, a concept of discriminatory weight is introduced. Second, with the help of fuzzy sets, risk scales are captured in terms of fuzzy sets (namely their membership functions). Third, a new risk analysis method involving discriminatory weights is proposed to realize a transformation from the membership degrees of the underlying indices to the membership degrees of the total target. At last, an example of information security risk analysis shows the effectiveness and feasibleness of the new method. Findings - The new method generalizes the weighted-average method. The comparative analysis done with respect to other two methods show that the proposed method exhibits higher classification accuracy. Therefore, the proposed method can be applied to other risk analysis system with a hierarchial. Originality/value - This paper proposes a new method for information security risk analysis with the help of membership functions and the concept of discriminatory weight. The new method generalizes the weighted-average method. Comparative analysis done with respect to other two methods show that the proposed method exhibits higher classification accuracy in E-government information security system. What is more, the proposed method can be applied to other risk analysis system with a hierarchial.
引用
收藏
页码:686 / 698
页数:13
相关论文
共 25 条
[1]  
[Anonymous], 2005, 27002 ISOIEC
[2]   SAT-based model-checking for security protocols analysis [J].
Armando, Alessandro ;
Compagna, Luca .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (01) :3-32
[3]   A warning on how to implement anonymous credential protocols into the information card framework [J].
Ates, Mikael ;
Buccafurri, Francesco ;
Fayolle, Jacques ;
Lax, Gianluca .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2012, 11 (01) :33-40
[4]  
Bai Y, 2012, COMM COM INF SC, V345, P547
[5]   Video calls from lay bystanders to dispatch centers - risk assessment of information security [J].
Bolle, Stein R. ;
Hasvold, Per ;
Henriksen, Eva .
BMC HEALTH SERVICES RESEARCH, 2011, 11
[6]   New delay-dependent stabilization conditions of T-S fuzzy systems with constant delay [J].
Chen, Bing ;
Liu, Xiaoping ;
Tong, Shaocheng .
FUZZY SETS AND SYSTEMS, 2007, 158 (20) :2209-2224
[7]   Rating technical attributes in fuzzy QFD by integrating fuzzy weighted average method and fuzzy expected value operator [J].
Chen, Yizeng ;
Fung, Richard Y. K. ;
Tang, Jiafu .
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2006, 174 (03) :1553-1566
[8]   A survey of certificateless encryption schemes and security models [J].
Dent, Alexander W. .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (05) :349-377
[9]   MEMBERSHIP FUNCTION AS AN EVALUATION [J].
DOMBI, J .
FUZZY SETS AND SYSTEMS, 1990, 35 (01) :1-21
[10]  
Eren-Dogu ZF, 2012, INT J INNOV COMPUT I, V8, P8019