A Collaborative Framework for Information Security Management System Using Intelligent Multi-Agent


Article Preview

Business use of Internet has exposed security as one of the key-factors for successful online competition. There are very few sound existing ISG frameworks that can effectively guide most organizations in their information security governance endeavors. This paper presents a collaborative framework for information security management system in order to elucidate how information security should be addressed at an executive level. The advanced intelligent multi-agent technology is applied in this proposed framework. In order to evaluate the proposed framework, this paper describes a prototype system based on this proposed collaborative framework. This prototype system suggests that the proposed collaborative framework is feasible, correct and valid.



Key Engineering Materials (Volumes 460-461)

Edited by:

Yanwen Wu






P. Wang and L. N. Xing, "A Collaborative Framework for Information Security Management System Using Intelligent Multi-Agent", Key Engineering Materials, Vols. 460-461, pp. 428-432, 2011

Online since:

January 2011




[1] K.P. Birman. The next-generation internet: unsafe at any speed. IEEE Computer. Vol. 33, no. 8 (2000) pp.54-60.

DOI: 10.1109/2.863968

[2] D. Trcek. An integral framework for information systems security management. Computers & Security. Vol. 22, no. 4 (2003) pp.337-360.

[3] J.M. Anderson. Why we need a new definition of information security. Computers & Security. Vol. 22, no. 4 (2003) pp.308-313.

DOI: 10.1016/s0167-4048(03)00407-3

[4] J. Rees, S. Bandyopadhyay, E.H. Spafford. PFIRES: A Policy Framework for Information Security. Communications of the ACM. Vol. 46, no. 7 (2003) pp.101-106.

DOI: 10.1145/792704.792706

[5] J.K. Tudor. Information Security Architecture. Proceeding of 26th International Conference on Software Engineering. Vol. 26. IEEE Computer Society. Edinburgh, United Kingdom (2003) pp.415-421.

[6] S. Halliday, K. Badehorst, S.R. Von. A business approach to effective information technology risk analysis and management. Information Management and Computer Security. Vol. 4, no. 1 (2009) pp.19-31.

In order to see related information, you need to Login.