期刊文献+

基于资源分布规律的信息系统风险量化模型 被引量:2

The Information System Risks Quantified Model Based on the Rules of Resources Distribution
下载PDF
导出
摘要 为了实施信息系统的风险度量,首先基于信息流的资源分布规律,参考风险评估要素改进模型,得到具有体系性和完整性的风险分布;在获取风险分布后,基于资源保护角度,考虑安全保护等级,运用层次分析法、多级模糊综合评判、函数级数展开、F-统计量等方法和工具对资源的安全属性所面临的风险进行量化,给出系统的风险量化指标体系,重点考虑风险之间的相关性,构建相关性准则,并得到其计算量为o(Si)。 In order to carry out the risk quantification for the information system, the risk distribution was proposed based on resources distribution of information system, and the improvement of elements relationship model for risk assessment. In quantifying risks, Analytic Hierarchy Process (AHP), Fuzzy Comprehensive Evaluation (FCE), Fstatistic and Least Square Estimation (LSE) was applied to get hierarchy of risk factors. The criteria of relativity and formulated relativity functions were established.
作者 王标 肖龙
出处 《四川大学学报(工程科学版)》 EI CAS CSCD 北大核心 2007年第6期129-133,共5页 Journal of Sichuan University (Engineering Science Edition)
基金 国家863高技术研究发展计划资助项目(2001AA142171)
关键词 资源分布规律 风险分布规律 风险关联 层次分析法 模糊综合评判 rules of resources distribution rules of risks distribution risk association F-statistic least square estimation analytic hierarchy process fuzzy comprehensive evaluation
  • 相关文献

参考文献10

二级参考文献24

  • 1左晓栋,刘毅.对信息安全风险评估中几个重要问题的认识[J].计算机安全,2004(7):64-66. 被引量:9
  • 2王标,胡勇,戴宗坤.风险评估要素关系模型的改进[J].四川大学学报(工程科学版),2005,37(3):110-114. 被引量:10
  • 3.GB 17859-1999.计算机信息系统安全保护等级划分准则[S].,1999..
  • 4陈王廷.决策分析[M].科学出版社,1987..
  • 5Fran Nielsen. Approaches to Security Metrics[ R]. Gaithersburg: NIST,2000.
  • 6ACSA and MITRE Corp. Information system security attribution quantification or ordering[ A] .2001 1^st Workshop on Information System Security Scoring and Ranking Proceedings [ C ]. Virginia: ACSA and MITRE Corp, 2001.1 - 70.
  • 7Bennet S Yee. Security metrology and the monty hall problem[EB/OL].http://ww.cs.ucsd.edu/-bsy/pub/metrology.pdt,2001 -04-02.
  • 8DoD 5200.28-STD, Department of Defense Trusted Computer System Evaluation Criteria[S].
  • 9ISO/IEC 15408, Information Technology-Security Techniques-Evaluation Criteria For IT Security[S].
  • 10GB17859—1999.计算机信息系统安全保护等级划分准则[S].[S].,..

共引文献93

同被引文献11

  • 1张晓宁,冯登国.无线自组网络中基于簇结构的安全方案[J].计算机研究与发展,2006,43(2):238-243. 被引量:6
  • 2周毅,张竞,周宁,陈晓桦.融入木桶原理的综合评估[J].计算机工程,2006,32(17):197-199. 被引量:5
  • 3Johnson E. A quantitative model of the security intrusion process Bbased on attacker behavior[J]. IEEE Transactions on Software Engineering, 1997,23 (4) :235 - 245.
  • 4Meadows C. The feasibility of quantitative assessment of security[ R]. Center for High Assurance Computer System Naval Research Laboratory, 1994.
  • 5Chan A H W, Lyu M R. Security modeling and evaluation for the mobile code paradigm [ M ]. Berlin : Springer Berlin/ Heidelberg, 1999 : 371 - 372.
  • 6孙强,陈伟,王东红.信息安全管理[M].北京:清华大学出版社,2004.
  • 7ONTI M, GIORDANO S. Mobile Ad Hoc networking: milestones, hallenges, and new research directions [ J]. IEEE Communications Vlagazine, 2014, 52(1) : 85 -96.
  • 8PAN L. Dynamic evaluation model of security risk in information sys- tem [ C]// ICCSEE2012: Proceedings of the 2012 International Con- ference on Computer Science and Electronics Engineering. Washing- ton, DC: IEEE Computer Society, 2012:225-229.
  • 9CHAN A H W, LYU M R. Security modeling and evaluation for the mobile code paradigm [C]//ASIAN99: Proceedings of the 5th Asi- an Computing Science Conference on Advances in Computing Sci- ence, LNCS 1742. Berlin: Springer, 1999:371-372.
  • 10MEADOWS C. The feasibility of quantitative assessment of security [ M]// Dependable Computing for Critical Applications 4. Vienna: Springer, 1995, 9:227-228.

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部