A fuzzy outranking approach in risk analysis of web service security

被引:6
作者
Wang, Ping [1 ]
Chao, Kuo-Ming
Lo, Chi-Chun
Huang, Chun-Lung
Younas, Muhammad
机构
[1] Kun Shan Univ Technol, Dept MIS, Tainan, Taiwan
[2] Fudan Univ, Software Sch, Shanghai 200433, Peoples R China
[3] Coventry Univ, Fac Engn & Comp, Coventry, W Midlands, England
[4] Natl Chiao Tung Univ, Inst Informat Management, Hsinchu, Taiwan
[5] Oxford Brookes Univ, Dept Comp, Oxford OX3 0BP, England
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2007年 / 10卷 / 01期
关键词
fuzzy outranking; risk analysis; web services security; pseudo-order; POPM;
D O I
10.1007/s10586-007-0002-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Risk analysis is considered as an important process to identify the known and potential vulnerabilities and threats in the web services security. It is quite difficult for users to collect adequate events to estimate the full vulnerabilities and probability of threats in the Web, due to the rapid change of the malicious attacks and the new computers vulnerabilities. In this paper, a fuzzy risk assessment model is developed in order to evaluate the risk of web services in a situation where complete information is not available. The proposed model extends Pseudo-Order Preference Model (POPM) to estimate the imprecise risk based on richness of information and to determine their ranking using a weighted additive rule. A case Study of a number of web services is presented in order to test the proposed approach.
引用
收藏
页码:47 / 55
页数:9
相关论文
共 50 条
  • [31] A risk analysis model for mining accidents using a fuzzy approach based on fault tree analysis
    Yasli, Fatma
    Bolat, Bersam
    JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT, 2018, 31 (04) : 577 - 594
  • [32] A new fuzzy risk assessment method for the network security based on fuzzy similarity measure
    Liao, Yongtao
    Ma, Cunbao
    Zhang, Chao
    WCICA 2006: SIXTH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-12, CONFERENCE PROCEEDINGS, 2006, : 8486 - +
  • [33] Uncertainty Handling in the Safety Risk Analysis: An Integrated Approach Based on Fuzzy Fault Tree Analysis
    Yazdi M.
    Zarei E.
    Journal of Failure Analysis and Prevention, 2018, 18 (2) : 392 - 404
  • [34] Risk analysis in a linguistic environment: A fuzzy evidential reasoning-based approach
    Deng, Yong
    Sadiq, Rehan
    Jiang, Wen
    Tesfamariam, Solomon
    EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (12) : 15438 - 15446
  • [35] A New Fuzzy Based Risk Assessment Approach for the Analysis of Occupational Risks in Manufacturing Sector
    Cebi, Selcuk
    Karamustafa, Merve
    INTELLIGENT AND FUZZY SYSTEMS: DIGITAL ACCELERATION AND THE NEW NORMAL, INFUS 2022, VOL 1, 2022, 504 : 261 - 270
  • [36] Risk analysis in green supply chain using fuzzy AHP approach: A case study
    Mangla, Sachin Kumar
    Kumar, Pradeep
    Barua, Mukesh Kumar
    RESOURCES CONSERVATION AND RECYCLING, 2015, 104 : 375 - 390
  • [37] An adaptive neuro-fuzzy approach to risk factor analysis of Salmonella Typhimurium infection
    Qin, Lixu
    Yang, Simon X.
    APPLIED SOFT COMPUTING, 2011, 11 (08) : 4875 - 4882
  • [38] Risk analysis in ultra deep scientific drilling project - A fuzzy synthetic evaluation approach
    Liu, Jia Lin
    Li, Quanxi
    Wang, Yuhan
    INTERNATIONAL JOURNAL OF PROJECT MANAGEMENT, 2013, 31 (03) : 449 - 458
  • [39] New XACML-AspectBPEL approach for composite web services security
    Ayoubi, Sara
    Mourad, Azzam
    Otrok, Hadi
    Shahin, Ahmad
    INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2013, 9 (02) : 127 - 145
  • [40] Risk analysis in fuzzy flow networks
    Tyshchuk, RV
    INTELLIGENT TECHNOLOGIES - THEORY AND APPLICATIONS: NEW TRENDS IN INTELLIGENT TECHNOLOGIES, 2002, 76 : 130 - 134