期刊文献+

基于模糊综合评判的电子商务系统安全评估 被引量:5

E-commerce system security assessment based on fuzzy synthetic evaluation
下载PDF
导出
摘要 针对电子商务系统安全评估问题,提出了基于模糊综合评判的电子商务系统安全评估的模型和方法。构建了电子商务系统安全评判的指标体系,描述了模糊综合评判方法,并根据电子商务系统的特点合理确定了模糊评判矩阵和权重系数集,最后通过算例阐明了应用模糊综合评判进行电子商务系统安全评估的具体实现步骤。实例分析和结果表明,提出的安全评估模型能够适用于结构复杂、功能繁多的电子商务系统安全评估,并且能够提供科学客观的评判结果。 To aim at the problem of information security assessment, a model and method of E-commerce system security assessment based on fuzzy synthetic evaluation is presented. Firstly, the guideline of E-commerce system security assessment is constructed. And then, the method of fuzzy synthesis evaluation is described, the fuzzy evaluation matrix and weight coefficients set are determined by taking the features of E-commerce system into consideration. Finally, by leveraging a concrete example, the implement process of fuzzy synthesis evaluation method for E-commerce system assessment is explained. The analysis on real application and its results identify that the information security evaluation model can apply to the evaluation for the complex E-commerce system, and it provide the scientific and fair evaluated results as well.
作者 李昕 刘建辉
出处 《计算机工程与设计》 CSCD 北大核心 2009年第17期4002-4005,共4页 Computer Engineering and Design
关键词 电子商务系统 信息安全评估 模糊集 模糊综合评判 权数分配 E-commerce system information security assessment fuzzy set fuzzy synthesis evaluation weights assignment
  • 相关文献

参考文献7

  • 1Kim T, Sung Y, Cho K, et al. A study on the efficiency elevation method of IT security system evaluation via process improvement [J]. Journal of Information Assurance KIAS,2003,13(1 ): 123-132.
  • 2Kim Y, Park G,Kim T.Security evaluation for information assurance[C]. Proceedings of the 5th IEEE International Conference on Computational Science and Applications, 2007:227-230.
  • 3谭良,佘堃,周明天.信息安全评估标准研究[J].小型微型计算机系统,2006,27(4):634-637. 被引量:14
  • 4Lynette B, Rossouwvon S.A formalized approach to the effective selection and evaluation of information security controls[J]. Computer & Security,2000,19(2): 185-194.
  • 5Overview of red team reports [EB/OL] .http://www.sos.ca.gov/ elections/voting_systems/ttbr/red_overview.pdf.
  • 6网络与信息安全标准研究现状[EB/OL].http://searchnetworking.techtarget.com.cn,2006.
  • 7金凤,蔡家楣,张繁.电子商务系统基本安全问题的分析和描述[J].计算机工程,2003,29(7):110-112. 被引量:6

二级参考文献24

  • 1Adams C Lloyd S.公开密钥基础设施—概念、标准和实施[M].北京:人民邮电出版社,2001-01..
  • 2Hassler V.电子商务安全基础[M].北京:人民邮电出版社,2001-09..
  • 3Schneier B. Secrets and Lies: Digital Security in a Networked World. John Wiley & Sons, 2000-08.
  • 4Garfinkel S, Spafford G . Practical Unix and Intemet Security . Sebastopol, CA: OReilly & Associates, Inc., 1996.
  • 5Schneire B. Cryptographic Design Vulnerabilifies. IEEE Computer, 1998,31(9): 29-33.
  • 6James P Anderson.Computer security technology planning study[Z].Volume II.ESD-TR-73-51,Electronic Systems Division,Air Force Systems Command,Hanscom.
  • 7Bell D E,Lapadula L J.Secure computer systems:unified exposition and multics interpretation[Z].MITRE Corp,1976,MTR-2997-3130.
  • 8US DoD 5200.28-STD,Trusted computer systems evaluation criteria[S].1985.
  • 9German Information Security Agency.IT-security criteria:criteria for the evaluation of trustworthiness of IT systems(first version)[S].1988.
  • 10United Kingdom Department for Trade and Industry.Security functionality manual[R].DRAFT Report,Feb 1989,21,3.0.

共引文献17

同被引文献51

引证文献5

二级引证文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部