A fuzzy outranking approach in risk analysis of web service security

被引:6
作者
Wang, Ping [1 ]
Chao, Kuo-Ming
Lo, Chi-Chun
Huang, Chun-Lung
Younas, Muhammad
机构
[1] Kun Shan Univ Technol, Dept MIS, Tainan, Taiwan
[2] Fudan Univ, Software Sch, Shanghai 200433, Peoples R China
[3] Coventry Univ, Fac Engn & Comp, Coventry, W Midlands, England
[4] Natl Chiao Tung Univ, Inst Informat Management, Hsinchu, Taiwan
[5] Oxford Brookes Univ, Dept Comp, Oxford OX3 0BP, England
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2007年 / 10卷 / 01期
关键词
fuzzy outranking; risk analysis; web services security; pseudo-order; POPM;
D O I
10.1007/s10586-007-0002-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Risk analysis is considered as an important process to identify the known and potential vulnerabilities and threats in the web services security. It is quite difficult for users to collect adequate events to estimate the full vulnerabilities and probability of threats in the Web, due to the rapid change of the malicious attacks and the new computers vulnerabilities. In this paper, a fuzzy risk assessment model is developed in order to evaluate the risk of web services in a situation where complete information is not available. The proposed model extends Pseudo-Order Preference Model (POPM) to estimate the imprecise risk based on richness of information and to determine their ranking using a weighted additive rule. A case Study of a number of web services is presented in order to test the proposed approach.
引用
收藏
页码:47 / 55
页数:9
相关论文
共 50 条
  • [21] Selecting Appropriate Project Delivery System: Fuzzy Approach with Risk Analysis
    Mostafavi, Ali
    Karamouz, Mohammad
    JOURNAL OF CONSTRUCTION ENGINEERING AND MANAGEMENT, 2010, 136 (08) : 923 - 930
  • [22] Fuzzy Logic Approach to Predictive Risk Analysis in Distribution Outage Management
    Chen, Po-Chen
    Kezunovic, Mladen
    IEEE TRANSACTIONS ON SMART GRID, 2016, 7 (06) : 2827 - 2836
  • [23] Fuzzy Risk Analysis of Harbour Engineering Investment by Hierarchy System Approach
    Lin Shaopei and Zhang Zhongming Professor
    China Ocean Engineering, 1992, (01) : 87 - 94
  • [24] A Hybrid Fuzzy System Dynamics Approach for Risk Analysis of AUV Operations
    Loh, Tzu Yang
    Brito, Mario P.
    Bose, Neil
    Xu, Jingjing
    Nikolova, Natalia
    Tenekedjiev, Kiril
    JOURNAL OF ADVANCED COMPUTATIONAL INTELLIGENCE AND INTELLIGENT INFORMATICS, 2020, 24 (01) : 26 - 39
  • [25] Risk analysis of urea manufacturing plant using fuzzy logic approach
    Sahu, Deepak
    Bahman, Anchal
    Murugan, Karrupaiya Sathaiah Bala
    Dhurandher, Bhisham Kumar
    Rai, Amit
    Dwivedi, Gaurav
    Kesharvani, Sujeet
    PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART E-JOURNAL OF PROCESS MECHANICAL ENGINEERING, 2024,
  • [26] The practical application of a process for eliciting and designing security in web service systems
    Gutierrez, Carlos
    Rosado, David G.
    Fernandez-Medina, Eduardo
    INFORMATION AND SOFTWARE TECHNOLOGY, 2009, 51 (12) : 1712 - 1738
  • [27] AHP-TOPSIS integration extended with Pythagorean fuzzy sets for information security risk analysis
    Ak, M. Fatih
    Gul, Muhammet
    COMPLEX & INTELLIGENT SYSTEMS, 2019, 5 (02) : 113 - 126
  • [28] Selection of Risk Analysis Method in Healthcare Facilities Through Fuzzy Logic Approach
    Aydin, Firat
    Can, Emine
    Iltar, Murat Ramazan
    Kara, Huseyin Enis
    INTELLIGENT AND FUZZY SYSTEMS, VOL 2, INFUS 2024, 2024, 1089 : 610 - 619
  • [29] Application of fuzzy DEMATEL approach in maritime transportation: A risk analysis of anchor loss
    Kuzu, Ali Cem
    OCEAN ENGINEERING, 2023, 273
  • [30] Security modelling for risk analysis
    Kwok, LF
    Longley, D
    SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2004, 147 : 29 - 45