DocumentCode :
2202888
Title :
A Planning-Based Method of Risk Process Modeling for Information Security
Author :
Zhen-zhen, Wang ; Xiao-yue, Wu ; Zhong, Liu ; Xu, Tan ; Feng, Cheng
Author_Institution :
IS&M Dept., NUDT, Changsha
fYear :
2008
fDate :
20-22 Dec. 2008
Firstpage :
1010
Lastpage :
1014
Abstract :
To evaluate the information security risk, an approach called PISRPMA is proposed to model the risk process of Information Security. PISRPMA describes risk domain and risk problem in PDDL language, reasons all exploitation paths using relative algorithms and builds a Planning Exploitation Graph to model the risk process. The experiment shows that this method has the features of formalization and scalability, and is a good solution for risk process modeling for information security.
Keywords :
graph theory; planning; risk analysis; security of data; information security; planning domain definition language; planning exploitation graph; risk process modeling approach; Combinatorial mathematics; Computer crime; Engines; Information security; Information systems; Path planning; Polynomials; Process planning; Scalability; Upper bound; PEG; Planning; risk process;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advanced Computer Theory and Engineering, 2008. ICACTE '08. International Conference on
Conference_Location :
Phuket
Print_ISBN :
978-0-7695-3489-3
Type :
conf
DOI :
10.1109/ICACTE.2008.45
Filename :
4737110
Link To Document :
بازگشت