{"title":"评估信息系统安全有效性的方法","authors":"G. Saparova","doi":"10.1109/ICAICT.2010.5612019","DOIUrl":null,"url":null,"abstract":"In the article approach to determining the quality of information security systems is classified, indicators for assessing the quality and features of the calculation are given. A modified algorithm of Balash is described which allows to minimize the computational cost through the use of integer variables, addition and subtraction, and select the best direction of descent on a tree-making inherent in techniques such as branch and bound. A method of estimating the computational complexity of the algorithm using this modification is offered.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Methods for assessing the effectiveness of information systems security\",\"authors\":\"G. Saparova\",\"doi\":\"10.1109/ICAICT.2010.5612019\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the article approach to determining the quality of information security systems is classified, indicators for assessing the quality and features of the calculation are given. A modified algorithm of Balash is described which allows to minimize the computational cost through the use of integer variables, addition and subtraction, and select the best direction of descent on a tree-making inherent in techniques such as branch and bound. A method of estimating the computational complexity of the algorithm using this modification is offered.\",\"PeriodicalId\":314036,\"journal\":{\"name\":\"2010 4th International Conference on Application of Information and Communication Technologies\",\"volume\":\"4 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-10-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 4th International Conference on Application of Information and Communication Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAICT.2010.5612019\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 4th International Conference on Application of Information and Communication Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAICT.2010.5612019","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Methods for assessing the effectiveness of information systems security
In the article approach to determining the quality of information security systems is classified, indicators for assessing the quality and features of the calculation are given. A modified algorithm of Balash is described which allows to minimize the computational cost through the use of integer variables, addition and subtraction, and select the best direction of descent on a tree-making inherent in techniques such as branch and bound. A method of estimating the computational complexity of the algorithm using this modification is offered.