首页 | 官方网站   微博 | 高级检索  
     

基于模糊距离的信息系统安全保障评估
引用本文:徐萃华,林家骏.基于模糊距离的信息系统安全保障评估[J].计算机工程,2011,37(5):169-171.
作者姓名:徐萃华  林家骏
作者单位:华东理工大学信息科学与工程学院,上海,200237
摘    要:以GB/T20274信息系统安全保障评估框架作为评估标准,在评估结果融合阶段通常根据D-S证据理论采用Dempster方法进行证据合成,但在处理高冲突数据时常出现违背常理的结果。为解决上述问题,提出基于模糊距离的证据合成方法,并与Dempster方法、Murphy方法、基于证据间距离的方法进行实验比较,结果证明,该合成方法能有效降低证据间的冲突,收敛速度较快,算法复杂度较低。

关 键 词:GB/T20274信息系统安全保障评估框架  糊距离  empster方法  全评估

Information System Security Assurance Evaluation Based on Fuzzy Distance
XU Cui-hua,LIN Jia-jun.Information System Security Assurance Evaluation Based on Fuzzy Distance[J].Computer Engineering,2011,37(5):169-171.
Authors:XU Cui-hua  LIN Jia-jun
Affiliation:(School of Information Science and Engineering,East China University of Science and Technology,Shanghai 200237,China)
Abstract:Using information system security assurance evaluation framework GB/T20274 as evaluation standard,it usually uses Dempster method to combine evidence results according to D-S evidential theory,but this method gets wrong result when the evidences have high conflicts.This paper puts forward an evidence combination rule based on fuzzy distance to solve the problem,and compares it with other evidence combination methods like Murphy method and the combination method based on the distances between evidences.Experimental result shows that the method can reduce the conflicts,and it has higher speed of constringency and lower complexity.
Keywords:GB/T20274 information system security assurance evaluation framework  fuzzy distance  Dempster method  security evaluation
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机工程》浏览原始摘要信息
点击此处可从《计算机工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号