{"title":"基于故障风险暴露的安全系统评估","authors":"Rajesh Purohit, Prof. K. R. Chowdhary","doi":"10.1109/ETNCC.2011.5958512","DOIUrl":null,"url":null,"abstract":"Verifying a security system needs large number of event sequences to be generated and applied to the candidate system. Like other systems, security systems have various components or subsystems i.e. hardware or software in it. A security subsystem is said to be failed in the case of false acception and false rejection. For a reliable system, verification has to be performed more extensively on specific part(s) of the system, which is expected to be used more. In this paper, usage pattern, failure risk and failure impact associated with every subsystem are considered as indicator parameters. The criticality is calculated on the basis of effective failure risk exposure (FRE) of the event sequences. This paper suggests a method to calculate criticality of part of the system which contribute more towards reliability of the security system.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Evaluation of security system based on failure-risk exposure\",\"authors\":\"Rajesh Purohit, Prof. K. R. Chowdhary\",\"doi\":\"10.1109/ETNCC.2011.5958512\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Verifying a security system needs large number of event sequences to be generated and applied to the candidate system. Like other systems, security systems have various components or subsystems i.e. hardware or software in it. A security subsystem is said to be failed in the case of false acception and false rejection. For a reliable system, verification has to be performed more extensively on specific part(s) of the system, which is expected to be used more. In this paper, usage pattern, failure risk and failure impact associated with every subsystem are considered as indicator parameters. The criticality is calculated on the basis of effective failure risk exposure (FRE) of the event sequences. This paper suggests a method to calculate criticality of part of the system which contribute more towards reliability of the security system.\",\"PeriodicalId\":221059,\"journal\":{\"name\":\"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-04-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ETNCC.2011.5958512\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ETNCC.2011.5958512","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Evaluation of security system based on failure-risk exposure
Verifying a security system needs large number of event sequences to be generated and applied to the candidate system. Like other systems, security systems have various components or subsystems i.e. hardware or software in it. A security subsystem is said to be failed in the case of false acception and false rejection. For a reliable system, verification has to be performed more extensively on specific part(s) of the system, which is expected to be used more. In this paper, usage pattern, failure risk and failure impact associated with every subsystem are considered as indicator parameters. The criticality is calculated on the basis of effective failure risk exposure (FRE) of the event sequences. This paper suggests a method to calculate criticality of part of the system which contribute more towards reliability of the security system.