Information System Security Risk Assessment Based on Multidimensional Cloud Model and The Entropy Theory

被引:0
|
作者
Huang, Liangliang [1 ]
Shen, Yongjun [1 ]
Zhang, Guidong [1 ]
Luo, Huixia [1 ]
机构
[1] Lanzhou Univ, Sch Informat Sci & Engn, Lanzhou, Gansu, Peoples R China
关键词
system of information; multidimensional; risk assessment; cloud model; entropy weight theory;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, information system security is faced with some serious problems which suffer increasing threats, the increasingly complicated environment and more and more uncertain factors. Moreover, there are some uncertainty, randomness and fuzziness in transforming between qualitative concepts and their quantitative expressions in the process of information security risk assessment. In order to improve objectivity and accuracy of information security risk assessment, information system security risk assessment based on multidimensional cloud model and the entropy theory is proposed in this paper.
引用
收藏
页码:11 / 15
页数:5
相关论文
共 50 条
  • [21] Risk Assessment of Supply Chain System Based on Information Entropy
    Li, Yang
    Wang, Lihai
    Heyde, Mark A.
    PROCEEDINGS OF 2010 INTERNATIONAL CONFERENCE ON LOGISTICS SYSTEMS AND INTELLIGENT MANAGEMENT, VOLS 1-3, 2010, : 1566 - +
  • [22] Risk Assessment of Enterprises Information Security Based on Fuzzy Set and Entropy Weight
    Wang, Yi
    Yuan, Jia-hang
    Zhang, Jian-ye
    Li, Cun-bin
    4TH INTERNATIONAL CONFERENCE ON ECONOMICS AND MANAGEMENT (ICEM), 2017, : 337 - 342
  • [23] Information security risk analysis model using information entropy
    Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    Beijing Youdian Daxue Xuebao, 2008, 2 (50-53):
  • [24] An Information System Security Risk Assessment Model Based on Fuzzy Analytic Hierarchy Process
    Liu Dong-liang
    Yang Shi-song
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 874 - 877
  • [25] Theory and methods of information security risk assessment
    Min, Jinghua
    Zhang, Jianjun
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2010, 50 (SUPPL. 1): : 1554 - 1559
  • [26] Risk Assessment of Debris Flow Based on Multidimensional Connection Normal Cloud Model
    Wang M.
    Wang X.
    Long J.
    Jin J.
    Yingyong Jichu yu Gongcheng Kexue Xuebao/Journal of Basic Science and Engineering, 2021, 29 (02): : 368 - 375
  • [27] Research on cloud service security measurement based on information entropy
    Gao, Tilei
    Li, Tong
    Jiang, Rong
    Yang, Ming
    Zhu, Rui
    International Journal of Network Security, 2019, 21 (06) : 1003 - 1013
  • [28] The Information Security Risk Assessment Model Based on GA - BP
    Song, Yongqiang
    Shen, Yongjun
    Zhang, Guidong
    Hu, Yuming
    PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 119 - 122
  • [29] Model design of project risk assessment based on cloud theory
    School of Economics and Management, Beijing University of Aeronautics and Astronautics, Beijing 100191, China
    Beijing Hangkong Hangtian Daxue Xuebao, 2008, 12 (1445-1447):
  • [30] Information Security Risk Assessment Based on Artificial Immune Danger Theory
    Zhuang, Yi
    Li, Xiaorong
    Xu, Bin
    Zhou, Bo
    2009 FOURTH INTERNATIONAL MULTI-CONFERENCE ON COMPUTING IN THE GLOBAL INFORMATION TECHNOLOGY (ICCGI 2009), 2009, : 169 - 174