{"title":"基于数据包络分析的信息系统安全仿生新体系","authors":"Jianrong Yao, Min Wei","doi":"10.1109/ICMECG.2014.28","DOIUrl":null,"url":null,"abstract":"With the information technology advances in recent years, security problems become significantly important. Known that security is a complex, impressionable and multidimensional property, useful measures to assess the information system security are hard to find. The biological immune system is an expert at recognizing the antigens. After distinguishing it from the 'self', the immune system will combine with its functions to obliterate the foreign pathogens. Through introducing the common characteristics between the immune system and the information system security architecture, this paper makes efficient use of the defence structure in the biological immune system to set a bionic architecture of information system security. The strategy of overall level is applied to information system security integrated with a variety of security protection measures. We regard 'risk' as the antigen, and we can identify the 'risk' in the information system security architecture with the aid of data envelopment analysis at this point. Afterwards, this will lay a foundation for achieving the bionic function of the information system security architecture.","PeriodicalId":413431,"journal":{"name":"2014 International Conference on Management of e-Commerce and e-Government","volume":"53 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A New Bionic Architecture of Information System Security Based on Data Envelopment Analysis\",\"authors\":\"Jianrong Yao, Min Wei\",\"doi\":\"10.1109/ICMECG.2014.28\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the information technology advances in recent years, security problems become significantly important. Known that security is a complex, impressionable and multidimensional property, useful measures to assess the information system security are hard to find. The biological immune system is an expert at recognizing the antigens. After distinguishing it from the 'self', the immune system will combine with its functions to obliterate the foreign pathogens. Through introducing the common characteristics between the immune system and the information system security architecture, this paper makes efficient use of the defence structure in the biological immune system to set a bionic architecture of information system security. The strategy of overall level is applied to information system security integrated with a variety of security protection measures. We regard 'risk' as the antigen, and we can identify the 'risk' in the information system security architecture with the aid of data envelopment analysis at this point. Afterwards, this will lay a foundation for achieving the bionic function of the information system security architecture.\",\"PeriodicalId\":413431,\"journal\":{\"name\":\"2014 International Conference on Management of e-Commerce and e-Government\",\"volume\":\"53 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-10-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 International Conference on Management of e-Commerce and e-Government\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICMECG.2014.28\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Management of e-Commerce and e-Government","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMECG.2014.28","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A New Bionic Architecture of Information System Security Based on Data Envelopment Analysis
With the information technology advances in recent years, security problems become significantly important. Known that security is a complex, impressionable and multidimensional property, useful measures to assess the information system security are hard to find. The biological immune system is an expert at recognizing the antigens. After distinguishing it from the 'self', the immune system will combine with its functions to obliterate the foreign pathogens. Through introducing the common characteristics between the immune system and the information system security architecture, this paper makes efficient use of the defence structure in the biological immune system to set a bionic architecture of information system security. The strategy of overall level is applied to information system security integrated with a variety of security protection measures. We regard 'risk' as the antigen, and we can identify the 'risk' in the information system security architecture with the aid of data envelopment analysis at this point. Afterwards, this will lay a foundation for achieving the bionic function of the information system security architecture.