메뉴 건너뛰기




Volumn 28, Issue 4, 2007, Pages

Model of fuzzy risk assessment of the information system

Author keywords

Analytic hierarchy process; Entropy; Fuzzy logical method; Information security; Model; Risk assessment

Indexed keywords

FUZZY LOGICAL METHOD; INFORMATION SECURITY; RISK VALUE;

EID: 34249989321     PISSN: 1000436X     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (34)

References (16)
  • 1
    • 0003969633 scopus 로고
    • Trusted computer system evaluation criteria
    • US National Computer Security Center, NCSC 5200. 28-STD
    • Trusted Computer System Evaluation Criteria [S]. US National Computer Security Center, NCSC 5200. 28-STD, 1985.
    • (1985)
  • 2
    • 0003765598 scopus 로고
    • Information technology security evaluation criteria
    • Provisional Harmonized Criteria of France, Germany, Netherlands, and United Kingdom, Commission of the European Communities
    • Information Technology Security Evaluation Criteria [S]. Provisional Harmonized Criteria of France, Germany, Netherlands, and United Kingdom, Commission of the European Communities, 1991.
    • (1991)
  • 3
    • 34250015830 scopus 로고    scopus 로고
    • Information technology-code of practice for information security management
    • The International Organization for Standardization, ISO/IEC 17799: 2000 (E)
    • The International Organization for Standardization. Information Technology-Code of Practice for Information Security Management, ISO/IEC 17799: 2000 (E) [S]. 1999.
    • (1999)
  • 4
    • 8444236881 scopus 로고    scopus 로고
    • Common criteria for information technology security evaluation - Part 1: Tntroduction and general model
    • The International Organization for Standardization, ISO/IEC 15408-1: 1999 (E)
    • The International Organization for Standardization. Common Criteria for Information Technology Security Evaluation - Part 1: Tntroduction and General Model, ISO/IEC 15408-1: 1999 (E) [S]. 1999.
    • (1999)
  • 5
    • 0012248971 scopus 로고    scopus 로고
    • Common criteria for information technology security evaluation - Part 2: Security function requirements
    • The International Organization for Standardization, ISO/IEC 15408-2: 1999 (E)
    • The International Organization for Standardization. Common Criteria for Information Technology Security Evaluation - Part 2: Security Function Requirements, ISO/IEC 15408-2: 1999 (E) [S]. 1999.
    • (1999)
  • 6
    • 33745585723 scopus 로고    scopus 로고
    • Common criteria for information technology security evaluation - Part 3: Security assurance requirements
    • The International Organization for Standardization, ISO/IEC 15408-3: 1999 (E)
    • The International Organization for Standardization. Common Criteria for Information Technology Security Evaluation - Part 3: Security Assurance Requirements, ISO/IEC 15408-3: 1999 (E) [S]. 1999.
    • (1999)
  • 7
    • 34249982315 scopus 로고    scopus 로고
    • A quantitative evaluation technique of attack effect of computer network based on network entropy
    • ZHANG Y R, XIAN M, WANG G Y. A quantitative evaluation technique of attack effect of computer network based on network entropy [J]. Journal on Communications, 2004, 25 (11): 158-165.
    • (2004) Journal on Communications , vol.25 , Issue.11 , pp. 158-165
    • Zhang, Y.R.1    Xian, M.2    Wang, G.Y.3
  • 8
    • 34250022909 scopus 로고    scopus 로고
    • CMS information security risk assessment methodology
    • Centers for Medicare and Medicaid Services (CMS)
    • Centers for Medicare and Medicaid Services (CMS). CMS Information Security Risk Assessment Methodology [S].
  • 10
    • 34249977330 scopus 로고    scopus 로고
    • Study on comprehensive assessment method for network security based on AHP and ANN
    • XU F Y, SHEN J, LI J Y. Study on comprehensive assessment method for network security based on AHP and ANN [J]. Computer Engineering and Applications, 2005, 29: 127-129.
    • (2005) Computer Engineering and Applications , vol.29 , pp. 127-129
    • Xu, F.Y.1    Shen, J.2    Li, J.Y.3
  • 11
    • 7244249876 scopus 로고    scopus 로고
    • Fuzzy risk assessment of entropy-weight coefficient method applied in network security
    • ZHAO D M, ZHANG Y Q, MA J F. Fuzzy risk assessment of entropy-weight coefficient method applied in network security [J]. Computer Engineering, 2004, 30 (18): 21-23.
    • (2004) Computer Engineering , vol.30 , Issue.18 , pp. 21-23
    • Zhao, D.M.1    Zhang, Y.Q.2    Ma, J.F.3
  • 14
    • 33745141365 scopus 로고    scopus 로고
    • Survey of information security risk assessment
    • FENG D G, ZHANG Y, ZHANG Y Q. Survey of information security risk assessment [J]. Journal on Communications, 2004, 25 (7): 10-18.
    • (2004) Journal on Communications , vol.25 , Issue.7 , pp. 10-18
    • Feng, D.G.1    Zhang, Y.2    Zhang, Y.Q.3
  • 15
    • 0013337442 scopus 로고    scopus 로고
    • A proposal for construction project risk assessment using fuzzy logic
    • JHM T, CARR V. A proposal for construction project risk assessment using fuzzy logic [J]. Construction Management and Economics, 2000, 18: 491-500.
    • (2000) Construction Management and Economics , vol.18 , pp. 491-500
    • Jhm, T.1    Carr, V.2
  • 16
    • 10344231556 scopus 로고    scopus 로고
    • Design of risk-assess tools based on BS7799
    • SUN T, ZHANG Y Q, MENG X W. Design of risk-assess tools based on BS7799 [J]. Computer Engineering, 2004, 30 (22): 63-66.
    • (2004) Computer Engineering , vol.30 , Issue.22 , pp. 63-66
    • Sun, T.1    Zhang, Y.Q.2    Meng, X.W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.