Title :
A Planning-Based Method of Risk Process Modeling for Information Security
Author :
Zhen-zhen, Wang ; Xiao-yue, Wu ; Zhong, Liu ; Xu, Tan ; Feng, Cheng
Author_Institution :
IS&M Dept., NUDT, Changsha
Abstract :
To evaluate the information security risk, an approach called PISRPMA is proposed to model the risk process of Information Security. PISRPMA describes risk domain and risk problem in PDDL language, reasons all exploitation paths using relative algorithms and builds a Planning Exploitation Graph to model the risk process. The experiment shows that this method has the features of formalization and scalability, and is a good solution for risk process modeling for information security.
Keywords :
graph theory; planning; risk analysis; security of data; information security; planning domain definition language; planning exploitation graph; risk process modeling approach; Combinatorial mathematics; Computer crime; Engines; Information security; Information systems; Path planning; Polynomials; Process planning; Scalability; Upper bound; PEG; Planning; risk process;
Conference_Titel :
Advanced Computer Theory and Engineering, 2008. ICACTE '08. International Conference on
Conference_Location :
Phuket
Print_ISBN :
978-0-7695-3489-3
DOI :
10.1109/ICACTE.2008.45