{"title":"信息系统安全的非最优分析方法","authors":"Libo Hou, Ping He","doi":"10.1109/CASE.2009.32","DOIUrl":null,"url":null,"abstract":"A kind of theory surrounding with sub-optimum information system, the systematical non-optimum analysis method, has been presented, and thereby the practice courses and results of mankind are classified by their natures into three categories: optimum, sub-optimum and non-optimum, and also, the way of seeking out the maximum sub-optimum has been found out. It is considered that the non-optimum system information does not exclude the targets and the results of non-optimization in practice. The formation of non-optimum information system serves as the basis for existence of optimum system. Besides, the various characteristics and functions of the optimum system can be measured from the non-optimum information system. By summing the practice, this paper has also come at sub-optimum principle of the information system, established the conception of sub-optimum thresholds and put forward three theorems about sub-optimum parameters. Finally, according to the previous practice of optimization, kind of method has been developed to approach the maximum sub-optimum from minimum non-optimum.","PeriodicalId":294566,"journal":{"name":"2009 IITA International Conference on Control, Automation and Systems Engineering (case 2009)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Approach of Non-optimum Analysis on Information Systems Security\",\"authors\":\"Libo Hou, Ping He\",\"doi\":\"10.1109/CASE.2009.32\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A kind of theory surrounding with sub-optimum information system, the systematical non-optimum analysis method, has been presented, and thereby the practice courses and results of mankind are classified by their natures into three categories: optimum, sub-optimum and non-optimum, and also, the way of seeking out the maximum sub-optimum has been found out. It is considered that the non-optimum system information does not exclude the targets and the results of non-optimization in practice. The formation of non-optimum information system serves as the basis for existence of optimum system. Besides, the various characteristics and functions of the optimum system can be measured from the non-optimum information system. By summing the practice, this paper has also come at sub-optimum principle of the information system, established the conception of sub-optimum thresholds and put forward three theorems about sub-optimum parameters. Finally, according to the previous practice of optimization, kind of method has been developed to approach the maximum sub-optimum from minimum non-optimum.\",\"PeriodicalId\":294566,\"journal\":{\"name\":\"2009 IITA International Conference on Control, Automation and Systems Engineering (case 2009)\",\"volume\":\"30 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-07-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 IITA International Conference on Control, Automation and Systems Engineering (case 2009)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CASE.2009.32\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 IITA International Conference on Control, Automation and Systems Engineering (case 2009)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CASE.2009.32","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Approach of Non-optimum Analysis on Information Systems Security
A kind of theory surrounding with sub-optimum information system, the systematical non-optimum analysis method, has been presented, and thereby the practice courses and results of mankind are classified by their natures into three categories: optimum, sub-optimum and non-optimum, and also, the way of seeking out the maximum sub-optimum has been found out. It is considered that the non-optimum system information does not exclude the targets and the results of non-optimization in practice. The formation of non-optimum information system serves as the basis for existence of optimum system. Besides, the various characteristics and functions of the optimum system can be measured from the non-optimum information system. By summing the practice, this paper has also come at sub-optimum principle of the information system, established the conception of sub-optimum thresholds and put forward three theorems about sub-optimum parameters. Finally, according to the previous practice of optimization, kind of method has been developed to approach the maximum sub-optimum from minimum non-optimum.