DocumentCode
2853769
Title
Configuration of integrated security system
Author
Levin, M.Sh. ; Leus, Andrey V.
Author_Institution
Inst. for Inform. Transm. Problems, Russian Acad. of Sci., Moscow, Russia
fYear
2009
fDate
23-26 June 2009
Firstpage
101
Lastpage
105
Abstract
This paper focuses on modular hierarchical design of configuration for an integrated security system. Hierarchical morphological design approach is used to search for Pareto-effective design solutions. An applied example involves the following: hierarchical (tree-like) model of the security system, design alternatives for system components/parts, criteria for the selection of the design alternatives, solving process as selection of the design alternatives and their synthesis into composite decisions as Pareto-effective solutions. System improvement/reconfiguration and multistage design are considered as well.
Keywords
Pareto analysis; security of data; Pareto-effective design solutions; composite decisions; hierarchical morphological design approach; improvement-reconfiguration; integrated security system configuration; modular hierarchical design; multistage design; Application software; Communication channels; Communication system security; Data security; Databases; Hidden Markov models; Information security; Physics; Process design; Software algorithms;
fLanguage
English
Publisher
ieee
Conference_Titel
Industrial Informatics, 2009. INDIN 2009. 7th IEEE International Conference on
Conference_Location
Cardiff, Wales
ISSN
1935-4576
Print_ISBN
978-1-4244-3759-7
Electronic_ISBN
1935-4576
Type
conf
DOI
10.1109/INDIN.2009.5195786
Filename
5195786
Link To Document