The information systems' security level assessment model based on an ontology and evidential reasoning approach

Computers & Security - Tập 55 - Trang 100-112 - 2015
Kresimir Solic1,2, Hrvoje Ocevcic3,2, Marin Golub4
1Faculty of Medicine, University of Osijek, Josipa Huttlera 4, HR-31000 Osijek, Croatia
2Faculty of Electrical Engineering, University of Osijek, Josipa Huttlera 4, HR-31000 Osijek, Croatia
3Hypo–Alpe-Adria-Bank d.d., Slavonska avenija 6, 10000 Zagreb, Croatia
4Faculty of Electrical Engineering and Computing, Zagreb University, Unska 3, HR-10000 Zagreb, Croatia

Tài liệu tham khảo

ANSSI Awad, 2011, Multi-objectives model to process security risk assessment based on AHP-PSO, Mod Appl Sci, 5, 246, 10.5539/mas.v5n3p246 Beckers, 2012, 242 Beynon, 2001, An expert system for multi-criteria decision making using Dempster–Shafer theory, Expert Syst Appl, 20, 357, 10.1016/S0957-4174(01)00020-3 BSI BSI CNiL Cornford, 2006, DDP: a tool for life-cycle risk management, IEEE Aerosp Electron Syst Mag, 21, 13, 10.1109/MAES.2006.1662004 Dardenne, 1993, Goal-directed requirements acquisition, Sci Comput Program, 20 Dempster, 1967, Upper and lower probabilities induced by a multivalued mapping, Ann Math Stat, 38, 325, 10.1214/aoms/1177698950 Ekelhart, 2009, 1 Fenz, 2011, A community knowledge base for IT security, IEEE ITPro, 13, 24 Gruber, 1995, Toward principles for the design of ontologies used for knowledge sharing, Int J Hum Comput Stud, 43, 907, 10.1006/ijhc.1995.1081 Haley, 2012, Information robbery: the 2011 internet security threat report Huang, 2008 Jagnjic, 2004, 13 Jovic, 2004, Condition based maintenance in distributed production environment, Mach Eng, 4, 180 Klaic, 2013, Conceptual modeling of information systems within the information security policies, J Econ Bus Manage, 1, 371, 10.7763/JOEBM.2013.V1.80 Klaic, 2011, 1532 Kruger, 2006, A prototype for assessing information security awareness, Comput Secur, 25, 289, 10.1016/j.cose.2006.02.008 Liu, 2008, Assessment of strategic R&D projects for car manufacturers based on the evidential reasoning approach, Int J Comput Intell Syst, 1, 24 Lund, 2011 Mangold, 2012, 522 Mouratidis, 2007, Secure tropos: a security-oriented extension of the tropos methodology, Int J Softw Eng Knowl Eng, 17, 285, 10.1142/S0218194007003240 Noy, 2005 Russell, 2010, 46 Sajko, 2010, 1215 Sasse, 2001, Transforming the “weakest link” – a human/computer interaction approach to usable and effective security, J BT Technol J Arch, 19, 122, 10.1023/A:1011902718709 Schmidt, 2011, Ch. 3: a pattern- and component-based method to develop secure software, 32 Schwittek, 2012, 499 Shafer, 1976 Solic, 2011, 1512 Solic, 2013, An approach to the assessment of potentially risky behavior of ICT systems' users, Tehn Vjesn, 20, 335 Srivastava, 2003, Applications of belief functions in business decisions: a review, Inf Syst Front, 5, 359, 10.1023/B:ISFI.0000005651.93751.4b Velki, 2014, 1564 W3C W3C Wu, 2005, Knowledge reduction in random information systems via Dempster–Shafer theory of evidence, Inf Sci, 174, 143, 10.1016/j.ins.2004.09.002 Yager, 1987, On the Dempster-Shafer framework and new combination rules, Inf Sci, 41, 93, 10.1016/0020-0255(87)90007-7 Yang, 1994, A general multi-level evaluation process for hybrid MADM with uncertainty, IEEE Trans Syst Man Cybern, 24, 1458, 10.1109/21.310529 Yang, 1994, An evidential reasoning approach for multiple attribute decision making with uncertainty, IEEE Trans Syst Man Cybern, 24, 1, 10.1109/21.259681 Yang, 2002, On the evidential reasoning algorithm for multiple attribute decision analysis under uncertainty, IEEE Trans Syst Man Cybern, 32, 289, 10.1109/TSMCA.2002.802746 Zhang, 2005, Research on subjective and objective evidence fusion method in oil reserve forecast, J Syst Simul, 17, 2537 Zhang, 1990, 13 Zhou, 2010, Evidential reasoning-based nonlinear programming model for MCDA under fuzzy weights and utilities, Int J Intel Syst, 25, 31, 10.1002/int.20387