高级检索

    程华, 房一泉, 袁文浩, 王雨. 信息系统安全保障评估的评估结构与方法[J]. 华东理工大学学报(自然科学版), 2014, (3): 381-387.
    引用本文: 程华, 房一泉, 袁文浩, 王雨. 信息系统安全保障评估的评估结构与方法[J]. 华东理工大学学报(自然科学版), 2014, (3): 381-387.
    CHENG Hua, FANG Yi-quan, YUAN Wen-hao, WANG Yu. Evaluation Structure and Method of Information System Security Assurance[J]. Journal of East China University of Science and Technology, 2014, (3): 381-387.
    Citation: CHENG Hua, FANG Yi-quan, YUAN Wen-hao, WANG Yu. Evaluation Structure and Method of Information System Security Assurance[J]. Journal of East China University of Science and Technology, 2014, (3): 381-387.

    信息系统安全保障评估的评估结构与方法

    Evaluation Structure and Method of Information System Security Assurance

    • 摘要: 信息系统的安全保障评估已经成为信息安全领域的重要研究内容,基于《信息系统安全保障评估框架》(GB/T 20274,简称SCC)标准完成系统的安全保障评估,能实现评估工作的规范化,提升评估结论的权威性和有效性。在SCC评估框架中引入CAE证据推理模型,得到了SCC的安全保障评估的多级层次结构;提出了基于DS证据理论的信息系统安全保障评估方法,实现了安全保障评估的定量推理。基于该评估方法计算了部分算例,实现了安全保障评估工具,并将DS算法与AHP算法进行了评估推理结论的对比。

       

      Abstract: The evaluation of security assurance for information system has been becoming an important research field of information security. The security assurance evaluation, based on 《Evaluation Framework for Information Systems Security Assurance》(GB/T 20274,SCC), can achieve the standardize of the evaluation process and improve the authoritative of evaluation results. By introducing CAE (Claim Argument Evidence) evidence reasoning model into SCC evaluation to obtain the multi level hierarchical structure of SCC security assurance evaluation, this paper proposes a DS evidence theory based security evaluation method. Thus, the quantitative inference on security assurance evaluation can be attained. Some examples are computed by utilizing the proposed algorithm to achieve the security assurance evaluation tool. Moreover, the comparison between DS and AHP algorithm are made for the evaluation inference.

       

    /

    返回文章
    返回