期刊文献+

基于AHP与模糊数学的信息安全风险评估模型 被引量:6

Information Security Risk Assessment Model based on AHP and Fuzzy
原文传递
导出
摘要 提出了一种在信息安全风险评估中采用层次分析方法进行风险的分析,而在风险的具体计算中采用模糊数学计算的信息安全风险评估模型。探索性的提出了一种改进的方法,把层次分析法与模糊数学计算结合起来,使得风险评估的结果得以量化,经实践证明,该模型可方便地应用于信息安全风险评估,使评估结果更科学、合理。最后辅以实例说明。 A risk analysis model is proposed,which adopts AHP( analytic hierarchy process) to implement risk analysis in information security risk assessment,and at the same time,the security risk assessment model with fuzzy mathematics is employed in practical risk calculation. An improved method,integrated with AHP and fuzzy mathematics,is used to quantize risk assessment result. Practice show that this model can easily used to implement risk assessment of the information security,thus making the evaluation result even more scientific and rational. And finally an actual example is given and explained.
出处 《信息安全与通信保密》 2014年第10期100-103,共4页 Information Security and Communications Privacy
基金 2013年度新疆维吾尔自治区高层次引进人才项目资助
关键词 信息安全 AHP 风险评估 模糊数学 information Security AHP risk assessment fuzzy mathematics
  • 相关文献

参考文献4

二级参考文献12

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:307
  • 2赵冬梅,马建峰,王跃生.信息系统的模糊风险评估模型[J].通信学报,2007,28(4):51-56. 被引量:63
  • 3TUYSUZ F, KAHRAMAN C. Project risk evaluation using a fuzzy analytic hierarchy process: an application to information technology projects[J]. International Joumal of Intelligent Systems, 2006, 21 (6) :559-584.
  • 4BENYOUCEF M, CANBOLAT M. Fuzzy AHP-based supplier selection in e-procurement[J]. International Journal of Services and Operations Management, 2007, 3 (5) : 172-192.
  • 5MIKHAILOV L. Deriving priorities from fuzzy pairwise comparison judgements[J]. Fuzzy Sets and Systems, 2003, 134(2) : 365- 385.
  • 6BELLMAN R E, ZADEH L A. Decision-making in a fuzzy environment[ J]. Management Science, 1970, 17(4) :141-64.
  • 7ZIMMERMANN H J. Description and optimization of fuzzy systems [J]. Intemational Journal of General Systems, 1976, 2(4): 209-215.
  • 8国家标准化管理委员会.GB/T20984--2007[S].北京:中国标准出版社,2007.
  • 9Google Android Team.Android SDK 1.5 r2 Reference[EB/OL].(2009-06-30)[2010-1-17].http://developer.android.com.
  • 10高焕堂.OPhone应用开发雕龙小技[EB/OL].(2010-03-04)[2010-03-15].http://dev.chinamobile.com/cmdn/bbs/ viewthread.php?tid=10567.

共引文献37

同被引文献30

  • 1李德毅,刘常昱.论正态云模型的普适性[J].中国工程科学,2004,6(8):28-34. 被引量:886
  • 2刘宝利,肖晓春,张根度.基于层次分析法的信息系统脆弱性评估方法[J].计算机科学,2006,33(12):62-64. 被引量:20
  • 3王元放,俞晓安,薛阳,敬忠良,周宏仁.基于层次分析法的信息化项目评估模型[J].计算机工程,2007,33(8):68-70. 被引量:23
  • 4吴涛.基于概念的不确定性关联规则挖掘[J].现代计算机,2007,13(5):11-13. 被引量:2
  • 5National Institute of Standards and Technology.NIST SP800-30-2001 Risk Management Guide for Information Technology System[S].2001.
  • 6Australian and New Zealand Standard Committee.AS/NZS 4360-2004 Risk Management[S].2004.
  • 7New British Standard Committee.BS 7799-3-2006 Risk Management Guidelines[S].2006.
  • 8中国国家标准化管理委员会.GB/T 25070-2010信息系统等级保护安全设计技术要求[S].2010.
  • 9Irfan S.Multicriteria Evaluation and Sensitivity Analysis on Information Security[J].International Journal of Computer Applications,2013,69(24):22-25.
  • 10Anuar N B,Papadaki M,Furnell S,et al.Incident Prioritization Using Analytic Hierarchy Process(AHP):Risk Index Model(RIM)[J].Security and Communication Networks,2013,6(9):1087-1116.

引证文献6

二级引证文献41

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部