{"title":"信息安全度量的正式方法","authors":"A. Chakraborty, A. Sengupta, C. Mazumdar","doi":"10.1109/EAIT.2012.6408003","DOIUrl":null,"url":null,"abstract":"Automation of Enterprise Information Systems has resulted in several information security issues. There is a need to devise ways of measuring information security. Existing techniques mostly concentrate on finding ways of measuring specific attributes of security devices. This paper is an initial step towards the development of a formal methodology for measuring enterprise information system security. The proposed technique may also be used to compare the relative security of information systems.","PeriodicalId":194103,"journal":{"name":"2012 Third International Conference on Emerging Applications of Information Technology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"A formal approach to information security metrics\",\"authors\":\"A. Chakraborty, A. Sengupta, C. Mazumdar\",\"doi\":\"10.1109/EAIT.2012.6408003\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Automation of Enterprise Information Systems has resulted in several information security issues. There is a need to devise ways of measuring information security. Existing techniques mostly concentrate on finding ways of measuring specific attributes of security devices. This paper is an initial step towards the development of a formal methodology for measuring enterprise information system security. The proposed technique may also be used to compare the relative security of information systems.\",\"PeriodicalId\":194103,\"journal\":{\"name\":\"2012 Third International Conference on Emerging Applications of Information Technology\",\"volume\":\"42 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Third International Conference on Emerging Applications of Information Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EAIT.2012.6408003\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Third International Conference on Emerging Applications of Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EAIT.2012.6408003","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Automation of Enterprise Information Systems has resulted in several information security issues. There is a need to devise ways of measuring information security. Existing techniques mostly concentrate on finding ways of measuring specific attributes of security devices. This paper is an initial step towards the development of a formal methodology for measuring enterprise information system security. The proposed technique may also be used to compare the relative security of information systems.