期刊文献+

基于分层分析法的安全评估参数模型研究 被引量:4

The Study of Parameter Model Based on AHP Method in Security Evaluation
下载PDF
导出
摘要 研究评估参数对安全评估结果的影响具有重要意义。分层分析方法(AHP)通过两两比较的方式确定各个因素相对重要性,然后综合决策者的判断,确定决策方案相对重要性的总排序。在实际操作中使用AHP方法常常不能得到一致性结果,从而造成结果可信度降低。论文的目的在于量化评估参数对安全评估的影响。方法采用了经过改进的AHP,结果提出了安全评估参数模型,并给出了量化评估参数的方法。结论是通过采用改进的分层分析方法对某新闻网进行安全评估,验证量化评估参数方法和参数影响模型的有效性和可行性,评估结果具有指导意义。 It is crucial to investigate the parameter which effect decisively on the result of security evaluation.Analytic Hierarchy Process gets the value of the parameters by comparing one with another one.According the results,people judge the importance of the parameters.Using AHP method,operations often can not get the result consistency. Consequently result reliability is not high.The objective is to quantify the effect of the evaluation parameters on security evaluation.The methods are the improved AHP(IAHP).One of The results is presenting the security evaluation model based on parameter;The other,describing a evaluation method based on parameters.The conclusion is that a case study shows that this model and method are effective and viable.
出处 《计算机工程与应用》 CSCD 北大核心 2006年第25期126-129,共4页 Computer Engineering and Applications
关键词 评估参数 AHP(分层分析方法) 安全评估 影响模型 evaluation parameter,AHP,security evaluation,affect model
  • 相关文献

参考文献9

  • 1韩伯棠.运筹学导论[M].第一版,北京:高等教育出版社,2000:365~375
  • 2吕跃进.基于模糊一致矩阵的模糊层次分析法的排序[J].模糊系统与数学,2002,16(2):79-85. 被引量:443
  • 3张吉军.模糊层次分析法(FAHP)[J].模糊系统与数学,2000,14(2):80-88. 被引量:1568
  • 4Guy Helmer,Johnny Wang,Mark Slagell et al.A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System[J].Requirements Engineering Journal,2002;7(4):207~220
  • 5Robyn R Lutz.Software Engineering for Safety:A Roadmap[C].In:Future of Software Engineering (FoSE),ICSE' 00,Ireland:ACM press,2000:213~226
  • 6Robyn R Lutz,Hui-Yin Shaw.Applying Adaptive Safety Analysis Techniques[C].In:Proceedings of the Tenth International Symposium on Software Reliability Engineering,Boca Raton,FL,1999:1~4
  • 7System Security Engineering Capability Maturity Model Appraisal Method version 2.0.1999
  • 8CC model,Common Criteria for Information Technology Security Evaluation version 2.1.1999
  • 9江常青,吴世忠.一种信息系统安全测度的框架[J].信息安全与通信保密,2002,24(1):26-28. 被引量:9

二级参考文献16

  • 1[1]Control Objectives for Information and Related Technology (COBIT) 3rd Edition,Information Systems Audit and Control Foundation, July 2000.
  • 2[2]IT Baselines Protection Manual published by Bundesamt f ür.Sicherheit in der Informationstechnik (BSI)
  • 3[3]A Code of Practice for Information Security (ISO/17799: 2000)
  • 4[4]General Accounting Office, Federal Information System Control Audit Manual (FISCAM). GOA/AIMD-12.19.6,January 1999.
  • 5[5]SSE-CMM(r) (model). System Security Engineering Capability Maturity Model. Model Description, Version 2.0. April 1999.
  • 6[6]Capability Maturity Mode forSoftware. Version 1.1 February 1993
  • 7[7]Trusted Computer System Evaluation Criteria US National Computer Security Center. 1985. NCSC 5200.28-STD.
  • 8[8]Information Technology Security Evaluation Criteria Provisional Harmonized Criteria of France. Germany. Netherlands.and United Kingdom. Commission of theEuropean Communities. 1991
  • 9[9]Communications Security Establishment. Canada. Canadian Trusted Computer Product Evaluation Criteria Version 3.0e. January 993
  • 10[10]Common Criteria for Information Technology Security Evaluation (CC). Version 2.1 .August 1999.

共引文献1805

同被引文献10

引证文献4

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部