• DocumentCode
    2853769
  • Title

    Configuration of integrated security system

  • Author

    Levin, M.Sh. ; Leus, Andrey V.

  • Author_Institution
    Inst. for Inform. Transm. Problems, Russian Acad. of Sci., Moscow, Russia
  • fYear
    2009
  • fDate
    23-26 June 2009
  • Firstpage
    101
  • Lastpage
    105
  • Abstract
    This paper focuses on modular hierarchical design of configuration for an integrated security system. Hierarchical morphological design approach is used to search for Pareto-effective design solutions. An applied example involves the following: hierarchical (tree-like) model of the security system, design alternatives for system components/parts, criteria for the selection of the design alternatives, solving process as selection of the design alternatives and their synthesis into composite decisions as Pareto-effective solutions. System improvement/reconfiguration and multistage design are considered as well.
  • Keywords
    Pareto analysis; security of data; Pareto-effective design solutions; composite decisions; hierarchical morphological design approach; improvement-reconfiguration; integrated security system configuration; modular hierarchical design; multistage design; Application software; Communication channels; Communication system security; Data security; Databases; Hidden Markov models; Information security; Physics; Process design; Software algorithms;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Industrial Informatics, 2009. INDIN 2009. 7th IEEE International Conference on
  • Conference_Location
    Cardiff, Wales
  • ISSN
    1935-4576
  • Print_ISBN
    978-1-4244-3759-7
  • Electronic_ISBN
    1935-4576
  • Type

    conf

  • DOI
    10.1109/INDIN.2009.5195786
  • Filename
    5195786