The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Uniform parameterisations of cooperations are defined in terms of formal language theory, such that each pair of partners cooperates in the same manner, and that the mechanism (schedule) to determine how one partner may be involved in several cooperations, is the same for each partner. Generalising each pair of partners cooperating in the same manner, for such systems of cooperations a kind of self-similarity...
According to the features of China's information security risk assessment, this paper presents a comprehensive risk assessment model based on the FSA and the AHP. This model calculated the value of information system security risks from a quantitative viewpoint. With this risk assessment method, China's enterprises could enhance their controls on the various information system security risks, thereby...
It is known that software system plays an important role in the information society, and high trustworthiness is a key requirement for many types of systems, such as safety critical systems, telecommunication systems, and mission critical software systems. How to improve the trustworthiness to better serve our society has become an important research focus among areas of software theory and technology...
Based on the analysis of the characteristics in the E-Commerce system and safety risk, the author has focused on the Fuzzy-ETA (event tree analyse)-FTA(fault tree analyse) method applied in the process risk management of R&D projects. The author has analyzed the possibility of an integration of EAT-FAT, and solved the problems in the integration of The Gray Synthetic Evaluation Theory by applying...
The enterprise information security which should be evaluated effectively and efficiently is very important to the development of the enterprise. The enterprise information security is inevitable to the profit organization and the non-profit organizations. Only the ability of the enterprise information security was evaluated, can the enterprise be developed prosperously. Nowadays, if the enterprise...
From the structure, functions and characteristics of office network, the threat and attack are analyzed. Office network is divided into network level, system level and application level. Using the primary components and factor analysis (PCFA), all levels' relationship and security strategy and realized way are elaborated. Different security strategy is applied reasonably. Based on PCFA and through...
A quantitative risk evaluation method for network security is proposed based on analyzing the process that attackers intrude network. The analysis depends on modeling attack activities and attack processes by tracking the transferring of safety states. Three key factors of risk evaluation about assets, threats and vulnerabilities are identified and quantified. Especially the attack probability indexes...
The mass of network security data is automatically and intelligently related and analyzed, which reveals the logic relations and the attack intention hidden behind the events. Sorting the attacks on various severities, a variety of fast and intuitive analysis report is generated. It can comprehensively monitor network status, effectively guide network security management, effective prevention, block...
Under the fully mechanized coal mining face contains many security features of unascertained, in this paper, the selection of the most able to face the impact of the safety of people, machines, and environmental factors as the evaluation index. Secondly, the definition of the unascertained measure indicators, and indicators of human, machine and environment factors in the security grading of the role...
The evaluation system is developed for network attack effect in this paper, and present the process from launching an attack to the result of evaluation being outputted. Based on an evaluation index system suitable for the system, we analyses some theories and methods respectively which are adopted to realize their functions by the main modules. Synthesis account of evaluated effect is conducted with...
In order to improve personal data security in the electronic commerce, and to avoid information exposing of personal privacy, personal data was used as the encrypted principle, applying homomorphism and random perturbation to strengthen personal data security. This paper analyzes the usage of personal data in electronic commerce firstly, and then some solved method was given in the database currently...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.