Information Security and Risk Control Model Based on Plan-Do-Check-Action for Digital Libraries

被引:0
|
作者
Yin Y. [1 ]
机构
[1] Library & Archives, North Sichuan Medical College, Nanchong
来源
关键词
digital library; information security; PDCA; PSO; risk control model; SVM;
D O I
10.13052/jcsm2245-1439.1326
中图分类号
学科分类号
摘要
To continuously and effectively control the potential risk factors of digital libraries, further improve the quality of digital library usage, ensure the smooth operation and information security of digital libraries, a security and risk factor control model for digital libraries based on the Plan-Do-Check-Action is constructed. A digital library security and risk identification model based on improved support vector machines is constructed. Based on the obtained risk identification results, a Plan-Do-Check-Action management model is implemented for information security in digital libraries. The R2L dataset in the network attack dataset is used for training and testing model performance. Then the proposed method is applied to two different digital libraries. The average accuracy of the risk identification model proposed in the research is 96.46%. The risk error of each level is maintained within 0.4%, which is within an acceptable range. The proposed method has a high recognition effect. It can be used to identify common security and risk issues encountered in digital libraries, and improve the information security performance. © 2024 River Publishers.
引用
收藏
页码:305 / 326
页数:21
相关论文
共 50 条
  • [21] An Action Based Access Control Model for Multi-level Security
    Su, Mang
    Li, Fenghua
    Shi, Guozhen
    Li, Li
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 359 - 366
  • [22] An Ontology-Based Security Risk Management Model for Information Systems
    Arogundade, Oluwasefunmi T.
    Abayomi-Alli, Adebayo
    Misra, Sanjay
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2020, 45 (08) : 6183 - 6198
  • [23] Study on risk assessment of information security based on cloud computing model
    Wu, Guo-Hua
    Liu, Yu-Cheng
    Qi, Kai-Kai
    Wang, Peng
    Xu, Jian-Da
    Proceedings of the 2016 International Conference on Engineering and Advanced Technology, 2016, 82 : 91 - 95
  • [24] The model of information security risk assessment based on advanced evidence theory
    Qing H.
    Qingsheng X.
    Shaobo L.
    International Journal of System Assurance Engineering and Management, 2017, 8 (Suppl 3) : 2030 - 2035
  • [25] Game-Model-Based Network Security Risk Control
    Ni, Zhen
    Li, Qianmu
    Liu, Gang
    COMPUTER, 2018, 51 (04) : 28 - 38
  • [26] Research on the network security risk control based on game model
    Wang, Wangang (wangwg77@163.com), 1600, Universidad Central de Venezuela (55):
  • [27] An Ontology-Based Security Risk Management Model for Information Systems
    Oluwasefunmi T. Arogundade
    Adebayo Abayomi-Alli
    Sanjay Misra
    Arabian Journal for Science and Engineering, 2020, 45 : 6183 - 6198
  • [28] Risk Assessment Model of Information Security for Transportation Industry System Based on Risk Matrix
    Zhao Xiangmo
    Dai Ming
    Ren Shuai
    Li Luyao
    Duan Zongtao
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (03): : 1301 - 1306
  • [29] Application value of evidence-based nursing based on the Plan-Do-Check- Action cycle in the nursing of neonatal hypoxic ischemic encephalopathy
    He, Xiaohua
    Xie, Qiaoqing
    INTERNATIONAL JOURNAL OF CLINICAL AND EXPERIMENTAL MEDICINE, 2020, 13 (12): : 9904 - 9913
  • [30] An Access Control Model for Grid Computing Based on Security Information Evaluation
    Xie, Ping
    Zhou, Jiang
    2009 INTERNATIONAL CONFERENCE ON FUTURE BIOMEDICAL INFORMATION ENGINEERING (FBIE 2009), 2009, : 49 - 52