• DocumentCode
    2202888
  • Title

    A Planning-Based Method of Risk Process Modeling for Information Security

  • Author

    Zhen-zhen, Wang ; Xiao-yue, Wu ; Zhong, Liu ; Xu, Tan ; Feng, Cheng

  • Author_Institution
    IS&M Dept., NUDT, Changsha
  • fYear
    2008
  • fDate
    20-22 Dec. 2008
  • Firstpage
    1010
  • Lastpage
    1014
  • Abstract
    To evaluate the information security risk, an approach called PISRPMA is proposed to model the risk process of Information Security. PISRPMA describes risk domain and risk problem in PDDL language, reasons all exploitation paths using relative algorithms and builds a Planning Exploitation Graph to model the risk process. The experiment shows that this method has the features of formalization and scalability, and is a good solution for risk process modeling for information security.
  • Keywords
    graph theory; planning; risk analysis; security of data; information security; planning domain definition language; planning exploitation graph; risk process modeling approach; Combinatorial mathematics; Computer crime; Engines; Information security; Information systems; Path planning; Polynomials; Process planning; Scalability; Upper bound; PEG; Planning; risk process;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Advanced Computer Theory and Engineering, 2008. ICACTE '08. International Conference on
  • Conference_Location
    Phuket
  • Print_ISBN
    978-0-7695-3489-3
  • Type

    conf

  • DOI
    10.1109/ICACTE.2008.45
  • Filename
    4737110