期刊文献+

多重不确定环境下基于证据理论的NIS安全风险评估模型 被引量:3

NIS Security Risk Assessment Model Based on Evidence Theory in Multi-uncertain Environment
下载PDF
导出
摘要 以证据理论为基础,构造一种能够适应多重不确定环境的网络信息系统安全风险评估模型。在模型中建立安全风险评估指标体系并对指标权重进行量化;重新定义基本概率赋值函数,以适应安全风险评估过程中证据的不确定性描述;实现证据一致性检验并确定调整方法,从而进一步降低评估过程中专家经验的不确定性;最后,通过实证分析验证该模型的正确性和有效性。 This paper develops a security risk assessment model in network information systems for multi-uncertain environment based on evidence theory. In the model, security risk index system is established and index weights are quantified. The paper redefines the basic probability assignment anew so that it is suitable for the uncertain description of evidences in the process of security risk assessment. To decrease the uncertainties of expert experience in the process of assessment, the test of evidence consistency is implemented and the method of adjustment is confirmed. Finally, the correctness and effectiveness of the model are validated via empirical analysis.
作者 冯楠 解晶
出处 《管理学报》 CSSCI 2011年第4期614-620,627,共8页 Chinese Journal of Management
基金 国家自然科学基金资助项目(70901054) 教育部博士点基金资助项目(新教师类20090032120036)
关键词 网络信息系统 安全风险 不确定性 证据理论 network information systems security risk uncertainty evidence theory
  • 相关文献

参考文献4

二级参考文献45

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:308
  • 2赵冬梅,张玉清,马建峰.网络安全的综合风险评估[J].计算机科学,2004,31(7):66-69. 被引量:23
  • 3刘大有,钟少春,高雅卿.具有两级不确定性的推理模型[J].软件学报,1993,4(3):45-52. 被引量:7
  • 4刘大有,李岳峰.广义证据理论的解释[J].计算机学报,1997,20(2):158-164. 被引量:18
  • 5Department of Defense.Trusted Computer System Evaluation Criteria[S].DoD 5200.282 STD,1985.
  • 6The Information Assurance Technical Framework(IATF).Release 3.1, NSA,2002-09.
  • 7Michael E Whitman,Herbert J Mattord.Principles of Information Security[M].Thomson Learning,2003.
  • 8Information technology-Guidelines for the management of IT Security- Part 3:Techniques for the management of IT Security[S].ISO/IEC TR 13335-3:1998(E), 1998.
  • 9The International Organization for Standardization.Information Technology- Code of Practice for Information Security Management[S].ISO/IEC 17799 : 2000 (E), 2000.
  • 10ACSA ed.Proceedings of the Workshop on Information Security System Scoring and Ranking[C].In : Williamsburg, Virginia,2001.

共引文献283

同被引文献60

  • 1马军生,李若山,李永伟.完善我国医疗保险基金监管体系的思考[J].中国卫生经济,2005,24(10):50-52. 被引量:23
  • 2郭梅,朱金福.基于模糊粗糙集的物流服务供应链绩效评价[J].系统工程,2007,25(7):48-52. 被引量:33
  • 3Tzeng G H, Chiang C H, Li C W.Evaluating intertwinedeffects in e-leaming programs : a novel hybrid MCDM modelbased on factor analysis and DEMATEL[J] .Expert Systemswith Applications,2007,32(4) : 1028-1044.
  • 4Wu H H, Chen H K.Evaluating performance criteria of employ-ment service outreach program by DEMATEL methodfJ].Expert Systems with Applications,2010,37(7) : 5219-5223.
  • 5Hu H Y, Chiu S L,Cheng C C.Applying the IPA and DEMATELmodels to improve the order-winner criteria: a case study ofTaiwan,s network communication equipment manufacturingindustry [J].Expert Systems with Applications, 2011, 38 (8):9674-9683.
  • 6Ouyang Y P, Shieh H M, Tzeng G H.A VIKOR techniquebased on DEMATEL and ANP for information securityrisk control assessment[J].Information Science,2013 ,232(2):482-500.
  • 7Lin C L, Wu W W.A fuzzy extension of the DEMATELmethod for group decision making[J].European Journal ofOperational Research,2004,35(9) :445-455.
  • 8Lin C L, Tzeng G H.A value-created system of science(technology) park by using DEMATEL[J].Expert Systemwith Application, 2009,36(6) :9683-9697.
  • 9Lee W S, Huang A Y, Chang Y Y, et al.Analysis of deci-sion making factors for equity investment by DEMATELand analytic network processfj].Expert System with Applica-tion,2011,38(7) :8375-8383.
  • 10Sengupta A,Pal T K.On comparing interval number[J].Euro-pean Journal of Operational Research, 2000,127(1): 28-43.

引证文献3

二级引证文献156

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部