DocumentCode
2202888
Title
A Planning-Based Method of Risk Process Modeling for Information Security
Author
Zhen-zhen, Wang ; Xiao-yue, Wu ; Zhong, Liu ; Xu, Tan ; Feng, Cheng
Author_Institution
IS&M Dept., NUDT, Changsha
fYear
2008
fDate
20-22 Dec. 2008
Firstpage
1010
Lastpage
1014
Abstract
To evaluate the information security risk, an approach called PISRPMA is proposed to model the risk process of Information Security. PISRPMA describes risk domain and risk problem in PDDL language, reasons all exploitation paths using relative algorithms and builds a Planning Exploitation Graph to model the risk process. The experiment shows that this method has the features of formalization and scalability, and is a good solution for risk process modeling for information security.
Keywords
graph theory; planning; risk analysis; security of data; information security; planning domain definition language; planning exploitation graph; risk process modeling approach; Combinatorial mathematics; Computer crime; Engines; Information security; Information systems; Path planning; Polynomials; Process planning; Scalability; Upper bound; PEG; Planning; risk process;
fLanguage
English
Publisher
ieee
Conference_Titel
Advanced Computer Theory and Engineering, 2008. ICACTE '08. International Conference on
Conference_Location
Phuket
Print_ISBN
978-0-7695-3489-3
Type
conf
DOI
10.1109/ICACTE.2008.45
Filename
4737110
Link To Document