Fuzzy Evaluation in the Comprehensive Review of the Information Systems Security
DOI:
CSTR:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    With the rapid development of Chinese information technology, information security becomes more and more important, the information level of security protection, risk assessment and security check as an important means of information security in China. Through the accumulation of years of information security evaluation experience, we combined with the risk assessment of the financial industry and the State Administration of Taxation of the national network system, grade protection evaluation and security check of three integrated work experience presented in the triple integration of information systems Information Security Information Security Evaluation, which operability and guidance based on fuzzy comprehensive evaluation methodology. Then we get fuzzy evaluation information security model.

    Reference
    Related
    Cited by
Get Citation

王海涛,郑君,杨子楠,刘宏志.模糊评价在信息系统安全综合评测中的应用.计算机系统应用,2012,21(11):7-10,160

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:March 26,2012
  • Revised:May 22,2012
  • Adopted:
  • Online:
  • Published:
Article QR Code
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063