Security evaluation method for confidential and stable complex systems
Confidential and stable complex systems are characterized by high confidentiality requirements,continuous and stable operation requirements,and complex network structure,but existing evaluation models has a single dimension of security objectives and lack the correlation analysis among indicators.In...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2019-04-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2019017 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841530026510516224 |
---|---|
author | Jinxin ZUO Ziyu GUO Jin LI Jie ZHANG Yueming LU |
author_facet | Jinxin ZUO Ziyu GUO Jin LI Jie ZHANG Yueming LU |
author_sort | Jinxin ZUO |
collection | DOAJ |
description | Confidential and stable complex systems are characterized by high confidentiality requirements,continuous and stable operation requirements,and complex network structure,but existing evaluation models has a single dimension of security objectives and lack the correlation analysis among indicators.In view of this,a comprehensive security evaluation model based on the correlation analysis of indicators is proposed and eight security objectives covering confidentiality,availability,controllability,identifiability,personnel organization,risk management,enterprise grading and sustainability at three levels of product,system and service have been established.Taking the confidentiality of the smart medical IoT as an example,a sorting and weight confirmation algorithm based on index correlation is constructed,and the fuzzy comprehensive evaluation method is used to evaluate the selected system. |
format | Article |
id | doaj-art-10410cc7c81944609c08cfed27626fe5 |
institution | Kabale University |
issn | 2096-109X |
language | English |
publishDate | 2019-04-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj-art-10410cc7c81944609c08cfed27626fe52025-01-15T03:13:24ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2019-04-015586559555488Security evaluation method for confidential and stable complex systemsJinxin ZUOZiyu GUOJin LIJie ZHANGYueming LUConfidential and stable complex systems are characterized by high confidentiality requirements,continuous and stable operation requirements,and complex network structure,but existing evaluation models has a single dimension of security objectives and lack the correlation analysis among indicators.In view of this,a comprehensive security evaluation model based on the correlation analysis of indicators is proposed and eight security objectives covering confidentiality,availability,controllability,identifiability,personnel organization,risk management,enterprise grading and sustainability at three levels of product,system and service have been established.Taking the confidentiality of the smart medical IoT as an example,a sorting and weight confirmation algorithm based on index correlation is constructed,and the fuzzy comprehensive evaluation method is used to evaluate the selected system.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2019017confidential and stable complex systeminformation security evaluationsort algorithmfuzzy comprehensive evaluation method |
spellingShingle | Jinxin ZUO Ziyu GUO Jin LI Jie ZHANG Yueming LU Security evaluation method for confidential and stable complex systems 网络与信息安全学报 confidential and stable complex system information security evaluation sort algorithm fuzzy comprehensive evaluation method |
title | Security evaluation method for confidential and stable complex systems |
title_full | Security evaluation method for confidential and stable complex systems |
title_fullStr | Security evaluation method for confidential and stable complex systems |
title_full_unstemmed | Security evaluation method for confidential and stable complex systems |
title_short | Security evaluation method for confidential and stable complex systems |
title_sort | security evaluation method for confidential and stable complex systems |
topic | confidential and stable complex system information security evaluation sort algorithm fuzzy comprehensive evaluation method |
url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2019017 |
work_keys_str_mv | AT jinxinzuo securityevaluationmethodforconfidentialandstablecomplexsystems AT ziyuguo securityevaluationmethodforconfidentialandstablecomplexsystems AT jinli securityevaluationmethodforconfidentialandstablecomplexsystems AT jiezhang securityevaluationmethodforconfidentialandstablecomplexsystems AT yueminglu securityevaluationmethodforconfidentialandstablecomplexsystems |