Security evaluation method for confidential and stable complex systems

Confidential and stable complex systems are characterized by high confidentiality requirements,continuous and stable operation requirements,and complex network structure,but existing evaluation models has a single dimension of security objectives and lack the correlation analysis among indicators.In...

Full description

Saved in:
Bibliographic Details
Main Authors: Jinxin ZUO, Ziyu GUO, Jin LI, Jie ZHANG, Yueming LU
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2019-04-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2019017
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530026510516224
author Jinxin ZUO
Ziyu GUO
Jin LI
Jie ZHANG
Yueming LU
author_facet Jinxin ZUO
Ziyu GUO
Jin LI
Jie ZHANG
Yueming LU
author_sort Jinxin ZUO
collection DOAJ
description Confidential and stable complex systems are characterized by high confidentiality requirements,continuous and stable operation requirements,and complex network structure,but existing evaluation models has a single dimension of security objectives and lack the correlation analysis among indicators.In view of this,a comprehensive security evaluation model based on the correlation analysis of indicators is proposed and eight security objectives covering confidentiality,availability,controllability,identifiability,personnel organization,risk management,enterprise grading and sustainability at three levels of product,system and service have been established.Taking the confidentiality of the smart medical IoT as an example,a sorting and weight confirmation algorithm based on index correlation is constructed,and the fuzzy comprehensive evaluation method is used to evaluate the selected system.
format Article
id doaj-art-10410cc7c81944609c08cfed27626fe5
institution Kabale University
issn 2096-109X
language English
publishDate 2019-04-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-10410cc7c81944609c08cfed27626fe52025-01-15T03:13:24ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2019-04-015586559555488Security evaluation method for confidential and stable complex systemsJinxin ZUOZiyu GUOJin LIJie ZHANGYueming LUConfidential and stable complex systems are characterized by high confidentiality requirements,continuous and stable operation requirements,and complex network structure,but existing evaluation models has a single dimension of security objectives and lack the correlation analysis among indicators.In view of this,a comprehensive security evaluation model based on the correlation analysis of indicators is proposed and eight security objectives covering confidentiality,availability,controllability,identifiability,personnel organization,risk management,enterprise grading and sustainability at three levels of product,system and service have been established.Taking the confidentiality of the smart medical IoT as an example,a sorting and weight confirmation algorithm based on index correlation is constructed,and the fuzzy comprehensive evaluation method is used to evaluate the selected system.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2019017confidential and stable complex systeminformation security evaluationsort algorithmfuzzy comprehensive evaluation method
spellingShingle Jinxin ZUO
Ziyu GUO
Jin LI
Jie ZHANG
Yueming LU
Security evaluation method for confidential and stable complex systems
网络与信息安全学报
confidential and stable complex system
information security evaluation
sort algorithm
fuzzy comprehensive evaluation method
title Security evaluation method for confidential and stable complex systems
title_full Security evaluation method for confidential and stable complex systems
title_fullStr Security evaluation method for confidential and stable complex systems
title_full_unstemmed Security evaluation method for confidential and stable complex systems
title_short Security evaluation method for confidential and stable complex systems
title_sort security evaluation method for confidential and stable complex systems
topic confidential and stable complex system
information security evaluation
sort algorithm
fuzzy comprehensive evaluation method
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2019017
work_keys_str_mv AT jinxinzuo securityevaluationmethodforconfidentialandstablecomplexsystems
AT ziyuguo securityevaluationmethodforconfidentialandstablecomplexsystems
AT jinli securityevaluationmethodforconfidentialandstablecomplexsystems
AT jiezhang securityevaluationmethodforconfidentialandstablecomplexsystems
AT yueminglu securityevaluationmethodforconfidentialandstablecomplexsystems