Extension and Unascertained Measure for Evaluation of Information Systems Security

Article Preview

Abstract:

Quantitative security risk evaluation of information systems is increasingly drawing more and more attention. The purpose of this paper is to propose a novel method integrated extension theory and unascertained method to classification for information systems (IS) security. The risks of information system are established on the basis of analyzing the factors affecting the risks of information system by applying the unascertained measure theory. Using matter-element theory, the extensibility of IS security is analyzed, and then the framework of matter-element models for IS security is formed. The matter element model of IS security risk evaluation is established using matter element model theory based on extension engineering method. Theoretical analysis and the design principle of the proposed method are described in detail. Some simulations are performed to demonstrate the effectiveness of the proposed extension and unascertained method. The result is believed to provide new means and ideas for the evaluation of IS security. The method is suitable for evaluating the risks of IS. Its evaluating results are reasonable. An example of practical application is given to show the effectiveness of this method. The model is more efficient than former models and can be easily realized in practice.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

190-195

Citation:

Online since:

January 2010

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2010 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Job Asheri Chaula, Louise Yngstrom, and Stewart Kowalski. Security metrics and evaluation of information systems security.

Google Scholar

[2] H. Iranmanesh, S. Nazari Shirkouhi, and M. R. Skandari. Risk Evaluation of Information Technology Projects Based on Fuzzy Analytic Hierarchal Process World Academy of Science, Engineering and Technology 40, 2008. 351-357.

Google Scholar

[3] CCIMB-2004-01-003, 2004, Common Criteria for Information Technology Security Evaluation: Security assurance requirements and Protection Profiles Version2. 2.

Google Scholar

[4] Common Methodology for Information Technology Security Evaluation Methodology Version 21999.

Google Scholar

[5] Olegas Vasilecas, Algis Saulis, Saulius Dereskeviius. Evaluation of information systems procurement.

Google Scholar

[6] Liu K.D. Pang Y.J. Sun G.Y. (2000). The unascertained measure model of appraisement of water environmental quality. Environment Engineering, 18(4): 58-60. (in Chinese).

Google Scholar

[7] Huawang Shi, Wanqing Li, Wenqing Meng. A New Approach to Construction Project Risk Assessment Based on Rough Set and Information Entropy. 2008 International Conference on Information Management, Innovation Management and Industrial Engineering. Dec, 2008, pp: 187-191.

DOI: 10.1109/iciii.2008.85

Google Scholar

[81] Huawang Shi. Application of Unascertained Measure to Classification of Expansive Soils. CCCM2009, 2009, 8.

Google Scholar

[9] Wang, G. Y, l990. Mathematics treatment of unascertained information. Journal of Civil Engineering Institute of Haerbin 23(4): l-9. (in Chinese).

Google Scholar

[10] Y.L. Ma, J.Y. Wang. Comprehensive evaluation of grey correlation analysis based on ideal plans, Systems Engineering and Electronics, No. 24, pp: 51-54. (2002).

Google Scholar

[11] Albert W. L. Yao, S.C. Chi, J.H. Chen, An improved grey-based approach for electricity demand forecasting, Electric Power Systems Resesrch, Vol 67, pp: 217-224. (2003).

DOI: 10.1016/s0378-7796(03)00112-3

Google Scholar