期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
信息安全评估标准研究与比较 被引量:6
1
作者 郭曙光 《信息技术与标准化》 2007年第11期27-29,共3页
对常用的信息安全评估国际标准:CC、BS7799和SSE-CMM标准,在针对的问题和具体目的、安全工程过程中的关注点和评估反映的实质等方面存在的差异和联系进行了较为详细的对比分析,并指出在同一信息安全系统评估或安全产品开发中的相互结合... 对常用的信息安全评估国际标准:CC、BS7799和SSE-CMM标准,在针对的问题和具体目的、安全工程过程中的关注点和评估反映的实质等方面存在的差异和联系进行了较为详细的对比分析,并指出在同一信息安全系统评估或安全产品开发中的相互结合的切入点。 展开更多
关键词 信息安全评 估国际标准 CC BS 7799 SSE-CMM
下载PDF
Synthetic security assessment based on variable consistency dominance-based rough set approach 被引量:3
2
作者 赵亮 Xue Zhi 《High Technology Letters》 EI CAS 2010年第4期413-421,共9页
Security assessment can help understand the security conditions of an information system and yield results highly conducive to the solution of security problems in it. Taking the computer networks in a certain univers... Security assessment can help understand the security conditions of an information system and yield results highly conducive to the solution of security problems in it. Taking the computer networks in a certain university as samples, this paper, with the information system security assessment model as its foundation, proposes a multi-attribute group decision-making (MAGDM) security assessment method based on a variable consistency dominance-based rough set approach (VC-DRSA). This assessment method combines VC-DRSA with the analytic hierarchy process (AHP), uncovers the inherent information hidden in data via the quality of sorting (QoS), and makes a synthetic security assessment of the information system after determining the security attribute weight. The sample findings show that this method can effectively remove the bottleneck of MAGDM, thus assuming practical significance in information system security assessment. 展开更多
关键词 multi-attribute group decision-making (MAGDM) security assessment variable consistency dominance-based rough set approach (VC-DRSA)
下载PDF
Synthetic security assessment for incomplete interval-valued information system 被引量:1
3
作者 赵亮 Xue Zhi 《High Technology Letters》 EI CAS 2012年第2期160-166,共7页
In order to understand the security conditions of the incomplete interval-valued information system (IllS) and acquire the corresponding solution of security problems, this paper proposes a multi-attribute group dec... In order to understand the security conditions of the incomplete interval-valued information system (IllS) and acquire the corresponding solution of security problems, this paper proposes a multi-attribute group decision- making (MAGDM) security assessment method based on the technique for order performance by similarity to ideal solution (TOPSIS). For IllS with preference information, combining with dominance-based rough set approach (DRSA), the effect of incomplete interval-valued information on decision results is discussed. For the imprecise judgment matrices, the security attribute weight can be obtained using Gibbs sampling. A numerical example shows that the proposed method can acquire some valuable knowledge hidden in the incomplete interval-valued information. The effectiveness of the proposed method in the synthetic security assessment for IIIS is verified. 展开更多
关键词 security assessment incomplete interval-valued information system(IIIS) multi-attribute group decision-making(MAGDM) technique for order performance by similarity to ideal solution(TOPSIS) dominance- based rough set approach(DRSA) Gibbs sampling
下载PDF
Advantages and Disadvantages of Quantitative and Qualitative Information Risk Approaches
4
作者 Stroie Elena Ramona 《Chinese Business Review》 2011年第12期1106-1110,共5页
Due to rapidly development of information systems, risk and security issues have increased and became a phenomenon that concerns every organization, without considering the size of it. To achieve desired results, mana... Due to rapidly development of information systems, risk and security issues have increased and became a phenomenon that concerns every organization, without considering the size of it. To achieve desired results, managers have to implement methods of evaluating and mitigating risk as part of a process well elaborated. Security risk management helps managers to better control the business practices and improve the business process. An effective risk management process is based on a successful IT security program. This doesn't mean that the main goal of an organization's risk management process is to protect its IT assets, but to protect the organization and its ability to perform their missions. During this process, managers have to take into consideration risks that can affect the organization and apply the most suitable measures to minimize their impact. The most important task is choosing the best suited method for analyzing the existing risk properly. Several methods have been developed, being classified in quantitative and qualitative approaches of evaluating risk. The purpose of this paper is to present the advantages and disadvantages of each approach taking current needs and opportunities into consideration. 展开更多
关键词 risk management risk analysis risk assessment quantitative approach qualitative approach
下载PDF
Safety Evaluation Method of Evacuation Routes in Areas in Case of Earthquake Disasters Using Ant Optimization Algorithm and Geographic Information Systems
5
作者 Kayoko Yamamoto Ximing Li 《Journal of Environmental Science and Engineering(A)》 2017年第9期462-478,共17页
The present study aims to propose the method for the quantitative evaluation of safety concerning evacuation routes in case of earthquake disasters in urban areas using ACO (Ant Colony Optimization) algorithm and G... The present study aims to propose the method for the quantitative evaluation of safety concerning evacuation routes in case of earthquake disasters in urban areas using ACO (Ant Colony Optimization) algorithm and GIS (Geographic Information Systems). Regarding the safety evaluation method, firstly, the similarity in safety was focused on while taking into consideration road blockage probability, and after classifying roads by means of the hierarchical cluster analysis, the congestion rates of evacuation routes using ACO simulations were estimated. Based on these results, the multiple evacuation routes extracted were visualized on digital maps by means of GIS, and its safety was evaluated. Furthermore, the selection of safe evacuation routes between evacuation sites, for cases when the possibility of large-scale evacuation after an earthquake disaster is high, is made possible. As the safety evaluation method is based on public information, by obtaining the same geographic information as the present study, it is effective in other areas regardless of whether the information is of the past and future. Therefore, in addition to spatial reproducibility, the safety evaluation method also has high temporal reproducibility. Because safety evaluations are conducted on evacuation routes based on quantified data, highly safe evacuation routes that are selected have been quantitatively evaluated, and thus serve as an effective indicator when selecting evacuation routes. 展开更多
关键词 Large-scale evacuation evacuation route safety evaluation earthquake disaster ACO (Ant Colony Optimization) GIS (Geographic Information Systems).
下载PDF
A Design of the Network Security Evaluation System
6
作者 Ziyan Shi Guolin Zhao Qiaolin Hu 《International Journal of Technology Management》 2014年第9期103-105,共3页
The security evaluation for an information network system is an important management tool to insure its normal operation. We must realize the significance of the comprehensive network security risks. A network evaluat... The security evaluation for an information network system is an important management tool to insure its normal operation. We must realize the significance of the comprehensive network security risks. A network evaluation model and the algorithm are presented and adapt the hierarchical method to characterize the security risk situation. The evaluation method is used to evaluate the key nodes and the mathematics is used to analyze the whole network security situation. Compared with others, the method can automatically create a rule-based security evaluation model to evaluate the security threat from the individual security elements and the combination of security elements, and then evaluation the network situation. It is shown that this system provides a valuable model and algorithms to help to find the security rules, adjust the security 展开更多
关键词 Security Evaluation Security Rules Evaluation Algorithm
下载PDF
Postmarketing studies on safety of Dengfeng~ shenmai injection 被引量:3
7
作者 Lianxin Wang Wen Zhang +3 位作者 Yanming Xie Yang Bai Mulan Wang Qinghua Ai 《Journal of Traditional Chinese Medicine》 SCIE CAS CSCD 2013年第6期827-831,共5页
OBJECTIVE: To systematically research the postmarketing safety of Dengfeng shenmai injection, identify potential risk factors, and ensure its clinical safety. METHODS: We investigated a comprehensive series of studies... OBJECTIVE: To systematically research the postmarketing safety of Dengfeng shenmai injection, identify potential risk factors, and ensure its clinical safety. METHODS: We investigated a comprehensive series of studies on the production process, quality standards, pharmacology, postmarketing clinical studies, and safety evaluation of Shenmai injection, including literature analysis of adverse drug reaction(ADR) case analysis and systematic review. Data from the hospital information system(HIS) and spontaneous reporting system(SRS) were also analyzed. RESULTS: The approximate dosage leading to death in dogs is 45.0-67.5 g raw drug/kg and the toxic reactions are restlessness, skin irritation, salivation, and vomiting. The results of chronic toxicity tests in mice and dogs, and the other tests such as 6-month toxicity, drug safety, genetic toxicity, and reproductive toxicity of rats and dogs, were positive or qualified. Patient ADR history and ADR family history were closely associated with itching based on the data analysis from SRS. There was no damage to renal function from Shenmai injection use at a dosage and a treatment course outside the recommended dosage and treatment course as specified based on data analysis from HIS. The most common ADR from Shenmai injection are difficulty breathing, facial flushing, nausea, vomiting, chest tightness, skin itching, rash, and back pain. CONCLUSION: This study includes complete information on Shenmai injection ADR incidence rate. We found that Shenmai injection is safe and this study can provide clinical, research, and production institutions with an objective, reliable, and scientific basis for use of Shenmai injection. 展开更多
关键词 Product surveillance postmarketing Medicine Chinese traditional SAFETY Shenmai in-jection
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部