Security evaluation method for confidential and stable complex systems
Confidential and stable complex systems are characterized by high confidentiality requirements,continuous and stable operation requirements,and complex network structure,but existing evaluation models has a single dimension of security objectives and lack the correlation analysis among indicators.In...
Saved in:
Main Authors: | Jinxin ZUO, Ziyu GUO, Jin LI, Jie ZHANG, Yueming LU |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2019-04-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2019017 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Application of fuzzy comprehensive evaluation method in network information security assessment of electric power enterprises
by: Daoyuan LIU, et al.
Published: (2020-03-01) -
DLP: REDUCED RISK OF LEAKAGE OF CONFIDENTIAL INFORMATION OF THE BANK
by: T. A. Andryianava, et al.
Published: (2017-11-01) -
基于层次分析—模糊评价的云计算安全评估与对策
by: Ai-min YANG, et al.
Published: (2016-10-01) -
Trust comprehensive evaluation based on the fuzzy inference theory in P2P network
by: QUAN Yi-ning 1, et al.
Published: (2009-01-01) -
Keeping confidentiality of sensitive attributes in credential during trust negotiation
by: LIAO Jun-guo1, et al.
Published: (2008-01-01)