Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Security based Risk Management based on Multi-Objectives Model using QPSO

Print
PDF
IJCA Proceedings on Majan College International Conference
© 2014 by IJCA Journal
MIC - Number 1
Year of Publication: 2014
Authors:
Elrasheed Ismail Sultan
Faisal Alamri
Kunna Mohamed
Noraziah. A
Ahmed N. Abdalla
Gamal Awad

Elrasheed Ismail Sultan, Faisal Alamri, Kunna Mohamed, Noraziah. A, Ahmed N Abdalla and Gamal Awad. Article: Security based Risk Management based on Multi-Objectives Model using QPSO. IJCA Proceedings on Majan College International Conference MIC(1):39-42, December 2014. Full text available. BibTeX

@article{key:article,
	author = {Elrasheed Ismail Sultan and Faisal Alamri and Kunna Mohamed and Noraziah. A and Ahmed N. Abdalla and Gamal Awad},
	title = {Article: Security based Risk Management based on Multi-Objectives Model using QPSO},
	journal = {IJCA Proceedings on Majan College International Conference},
	year = {2014},
	volume = {MIC},
	number = {1},
	pages = {39-42},
	month = {December},
	note = {Full text available}
}

Abstract

Nowadays the security risk management play a crucial role, which is applied to the entire life cycle of information systems and communication technologies but still so many models for security risk management are non-practical, therefore, it should be measured and improved. In this paper, a novel approach, in which Analytic Hierarchy Process (AHP) and Quantum Particles Swarm Optimization (QPSO) can be combined with some changes, is presented. The method consists of; firstly, the analytic hierarchy structure of the risk management is constructed and the method of QPSO comprehensive judgment is improved according to the actual condition of the information security. Secondly, the risk degree put forward is QPSO estimation of the risk probability, the risk impact severity and risk uncontrollability. Finally, it gives examples to prove that this method Multi Objectives Programming Methodology (MOPM) can be well applied to security risk management and provides reasonable data for constituting the risk control strategy of the information systems security. Based on the risk management results, the targeted safety measures are taken, and the risk is transferred and reduced, which is controlled within an acceptable range.

References

  • Wang Yingmei, Wang Shengkai and Cheng Xiangyun, Security Risk Management of Information System, Publishing House of Electronic Industry, Beijing, 2007.
  • ISO/IEC15408, Common Criteria for IT Security Evaluation. Version 2. 1. The International Organization for Standardization, 1999.
  • Common Criteria for Information Technology Security Evaluation, v3. 0, June 2005.
  • M. Kendall, Rank correlation methods. 3rd ed. ; 1962. NY.
  • Y. Deng, W. K. Shi, F. Du, A new similarity measure of generalized fuzzy numbers and its application to pattern recognition, Pattern Recognition Letters, vol. 24, no. 8, pp. 875-883, 2004.
  • F. Du, W. K. Shi and Y. Deng, "New similarity measure of generalized fuzzy numbers," Journal of Shanghai Jiaotong University, vol. 39, no. 8, pp. 614-617, 2005.
  • Lu Simei, Zhang Jianlin, Security Risk Management Model Based on AHP/D-S Evidence Theory, International Forum on Information Technology and Applications, 2009.
  • Marc J. Schniederjans a, Tim Garvin, Using the Analytic Hierarchy Process and multi-objective programming for the selection of cost drivers in activity-based costing.
  • Dong-Mei Zhao, Jing-Hong Wang, Using Fuzzy Logic And Entropy Theory To Risk Management Of The Information Security, Proceedings of the Fourth International Conference on Machine Learning and Cybernetics, Guangzhou, 2005.
  • Omkarprasad S Vaidya, Sushil Kumar, Analytic hierarchy process: An overview of applications, European Journal of Operational Research 169 (2006)