Chinese Journal of Network and Information Security ›› 2019, Vol. 5 ›› Issue (2): 58-65.doi: 10.11959/j.issn.2096-109x.2019017

• Papers • Previous Articles     Next Articles

Security evaluation method for confidential and stable complex systems

Jinxin ZUO1,2(),Ziyu GUO1,2,Jin LI1,2,Jie ZHANG3,Yueming LU1,2   

  1. 1 Beijing University of Posts and Telecommunications,Beijing 100876,China
    2 Key Laboratory of Trustworthy Distributed Computing and Service (BUPT),Ministry of Education,Beijing 100876,China
    3 Institute of Systems Engineering,Academies of Military Science,Beijing 100091,China
  • Revised:2018-12-20 Online:2019-04-15 Published:2019-04-16
  • Supported by:
    The National Key Research and Development Program(2016YFF0204001)

Abstract:

Confidential and stable complex systems are characterized by high confidentiality requirements,continuous and stable operation requirements,and complex network structure,but existing evaluation models has a single dimension of security objectives and lack the correlation analysis among indicators.In view of this,a comprehensive security evaluation model based on the correlation analysis of indicators is proposed and eight security objectives covering confidentiality,availability,controllability,identifiability,personnel organization,risk management,enterprise grading and sustainability at three levels of product,system and service have been established.Taking the confidentiality of the smart medical IoT as an example,a sorting and weight confirmation algorithm based on index correlation is constructed,and the fuzzy comprehensive evaluation method is used to evaluate the selected system.

Key words: confidential and stable complex system, information security evaluation, sort algorithm, fuzzy comprehensive evaluation method

CLC Number: 

No Suggested Reading articles found!