A probabilistic relational model for security risk analysis

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A probabilistic relational model for security risk analysis

Information system security risk, defined as the product of the monetary losses associated with security incidents and the probability that they occur, is a suitable decision criterion when considering different information system architectures. This paper describes how probabilistic relational models can be used to specify architecture metamodels so that security risk can be inferred from meta...

متن کامل

Information Security Governance Analysis Using Probabilistic Relational Models

The presentation will concern my current research project aiming at developing a Probabilistic Relational Model (PRM) to support analysis of Information Security Governance (ISG) in an organization. The awareness of the important aspects of information security that ISG covers has increased among companies as it provides a holistic approach to protection of organizational assets. ISG considers ...

متن کامل

Fuzzy model for risk analysis

The goal of this paper is to show how the concept of fuzzy logic can be used to establish a degree to which an investment project belongs to a class of risk. Also, the probability of the fuzzy event is presented and is ap-plied to calculate the probability of the fuzzy event “the project X is a good investment”. This process has to enable the decision maker to compare several alternative invest...

متن کامل

A Statistical-Probabilistic Pattern for Determination of Tunnel Advance Step by Quantitative Risk Analysis

One of the main challenges faced in design and construction phases of tunneling projects is the determination of maximum allowable advance step to maximize excavation rate and reduce project delivery time. Considering the complexity of determining this factor and unexpected risks associated with inappropriate determination of that, it is necessary to employ a method which is capable of accounti...

متن کامل

Probabilistic Relational Hoare Logics for Computer-Aided Security Proofs

The provable security paradigm originates from the work of Goldwasser and Micali [10] and plays a central role in modern cryptography. Since its inception, the focus of provable security has gradually shifted towards practice-oriented provable security [4]. The central goal of practice-oriented provable security is to develop and analyze efficient cryptographic systems that can be used for prac...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computers & Security

سال: 2010

ISSN: 0167-4048

DOI: 10.1016/j.cose.2010.02.002