Information System Security Risk Assessment Based on Multidimensional Cloud Model and The Entropy Theory

被引:0
|
作者
Huang, Liangliang [1 ]
Shen, Yongjun [1 ]
Zhang, Guidong [1 ]
Luo, Huixia [1 ]
机构
[1] Lanzhou Univ, Sch Informat Sci & Engn, Lanzhou, Gansu, Peoples R China
关键词
system of information; multidimensional; risk assessment; cloud model; entropy weight theory;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, information system security is faced with some serious problems which suffer increasing threats, the increasingly complicated environment and more and more uncertain factors. Moreover, there are some uncertainty, randomness and fuzziness in transforming between qualitative concepts and their quantitative expressions in the process of information security risk assessment. In order to improve objectivity and accuracy of information security risk assessment, information system security risk assessment based on multidimensional cloud model and the entropy theory is proposed in this paper.
引用
收藏
页码:11 / 15
页数:5
相关论文
共 50 条
  • [1] Comprehensive risk assessment of the information system based on entropy theory
    Zhao, DM
    Wang, CG
    Zhang, YK
    Wang, FW
    Ma, JF
    Progress in Intelligence Computation & Applications, 2005, : 402 - 408
  • [2] Study on risk assessment of information security based on cloud computing model
    Wu, Guo-Hua
    Liu, Yu-Cheng
    Qi, Kai-Kai
    Wang, Peng
    Xu, Jian-Da
    Proceedings of the 2016 International Conference on Engineering and Advanced Technology, 2016, 82 : 91 - 95
  • [3] Research of Information System Security Risk Management based on Probability Model and Security Entropy
    Du, Jiawei
    Zhou, Ying
    Guo, Ronghua
    Zhang, Xing
    Suo, Guowei
    INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATION ENGINEERING (CSAE), 2017, 190 : 414 - 420
  • [4] Power System Risk Security Assessment Based on Maximum Information Entropy Principle
    Zeng, Ke
    Li, Hua-qiang
    Zeng, Meng-jie
    Liu, Pei-qing
    2014 INTERNATIONAL CONFERENCE ON POWER SYSTEM TECHNOLOGY (POWERCON), 2014,
  • [5] An assessment model for cloud service security risk based on entropy and support vector machine
    Jiang, Rong
    Ma, Zifei
    Yang, Juan
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (21):
  • [6] The model of information security risk assessment based on advanced evidence theory
    Qing H.
    Qingsheng X.
    Shaobo L.
    International Journal of System Assurance Engineering and Management, 2017, 8 (Suppl 3) : 2030 - 2035
  • [7] Information security risk analysis model based on entropy
    Tang, Y. L.
    Xu, G. A.
    Niu, Y. X.
    Yang, Y. X.
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 4, 2008, : 1146 - 1150
  • [8] Using fuzzy logic and entropy theory to risk assessment of the information security
    Zhao, DM
    Wang, JH
    Wu, J
    Ma, JF
    Proceedings of 2005 International Conference on Machine Learning and Cybernetics, Vols 1-9, 2005, : 2448 - 2453
  • [9] The Effectiveness Evaluation for Security System Based on Risk Entropy Model and Bayesian Network Theory
    Guo, Xi
    Hu, Ruimin
    44TH ANNUAL 2010 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, 2010, : 57 - 65
  • [10] General risk assessment model for information system security
    Chi, Yue
    Zhang, Yong-Zheng
    Yun, Xiao-Chun
    Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2005, 37 (SUPPL. 1): : 192 - 194