The formal framework of security infrastructure design
The paper is devoted to developing of the formal framework of security infrastructure design, which considers not only technical, but also economical results of safeguards implementation to the computer system. The problem's solution is shared in two phases. During the fist phase we must compos...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 118 |
---|---|
container_issue | |
container_start_page | 116 |
container_title | |
container_volume | |
creator | Nesterov, S.A. |
description | The paper is devoted to developing of the formal framework of security infrastructure design, which considers not only technical, but also economical results of safeguards implementation to the computer system. The problem's solution is shared in two phases. During the fist phase we must compose the set of security subsystem projects, which obey specified conditions and restrictions. That problem is treated using original set-theory model and backtracking algorithm. The goal of the second stage is selection of the optimal project from this set. On that stage game theory methods are used. |
doi_str_mv | 10.1109/SIBCON.2003.1335739 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_1335739</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1335739</ieee_id><sourcerecordid>1335739</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-ef937d73482640a0ba73a233d2f0dcb922758c7c7e5732c7f4b4defff9ca8ddc3</originalsourceid><addsrcrecordid>eNotj8tqwzAURAWlkDbNF2SjH7Ar68q-1rI1fQRCsqj3QZauUrVxXCSbkr-voZnNwFkMZxhbFyIvCqEfPzbPzX6XSyEgLwBKBH3D7gXWArAuFS7YKqUvMUeVSlbFHavaT-J-iL05cR9NT79D_OaD54nsFMN44eE88zTGyY5TJO4oheP5gd16c0q0uvaSta8vbfOebfdvm-ZpmwUtxoy8BnQIqpaVEkZ0BsFIACe9cLbTUmJZW7RIs6m06FWnHHnvtTW1cxaWbP0_G4jo8BNDb-LlcH0Gf1ueRak</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>The formal framework of security infrastructure design</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Nesterov, S.A.</creator><creatorcontrib>Nesterov, S.A.</creatorcontrib><description>The paper is devoted to developing of the formal framework of security infrastructure design, which considers not only technical, but also economical results of safeguards implementation to the computer system. The problem's solution is shared in two phases. During the fist phase we must compose the set of security subsystem projects, which obey specified conditions and restrictions. That problem is treated using original set-theory model and backtracking algorithm. The goal of the second stage is selection of the optimal project from this set. On that stage game theory methods are used.</description><identifier>ISBN: 0780378547</identifier><identifier>ISBN: 9780780378544</identifier><identifier>DOI: 10.1109/SIBCON.2003.1335739</identifier><language>eng</language><publisher>IEEE</publisher><subject>Computer security ; Cost function ; Decision trees ; Game theory ; Information analysis ; Information security ; Instruments ; Operating systems ; Risk analysis ; Statistical analysis</subject><ispartof>IEEE/Siberian Conference on Control and Communications (IEEE Cat. No.03EX687), 2003, p.116-118</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1335739$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,4050,4051,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1335739$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Nesterov, S.A.</creatorcontrib><title>The formal framework of security infrastructure design</title><title>IEEE/Siberian Conference on Control and Communications (IEEE Cat. No.03EX687)</title><addtitle>SIBCON</addtitle><description>The paper is devoted to developing of the formal framework of security infrastructure design, which considers not only technical, but also economical results of safeguards implementation to the computer system. The problem's solution is shared in two phases. During the fist phase we must compose the set of security subsystem projects, which obey specified conditions and restrictions. That problem is treated using original set-theory model and backtracking algorithm. The goal of the second stage is selection of the optimal project from this set. On that stage game theory methods are used.</description><subject>Computer security</subject><subject>Cost function</subject><subject>Decision trees</subject><subject>Game theory</subject><subject>Information analysis</subject><subject>Information security</subject><subject>Instruments</subject><subject>Operating systems</subject><subject>Risk analysis</subject><subject>Statistical analysis</subject><isbn>0780378547</isbn><isbn>9780780378544</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2003</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj8tqwzAURAWlkDbNF2SjH7Ar68q-1rI1fQRCsqj3QZauUrVxXCSbkr-voZnNwFkMZxhbFyIvCqEfPzbPzX6XSyEgLwBKBH3D7gXWArAuFS7YKqUvMUeVSlbFHavaT-J-iL05cR9NT79D_OaD54nsFMN44eE88zTGyY5TJO4oheP5gd16c0q0uvaSta8vbfOebfdvm-ZpmwUtxoy8BnQIqpaVEkZ0BsFIACe9cLbTUmJZW7RIs6m06FWnHHnvtTW1cxaWbP0_G4jo8BNDb-LlcH0Gf1ueRak</recordid><startdate>2003</startdate><enddate>2003</enddate><creator>Nesterov, S.A.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>2003</creationdate><title>The formal framework of security infrastructure design</title><author>Nesterov, S.A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-ef937d73482640a0ba73a233d2f0dcb922758c7c7e5732c7f4b4defff9ca8ddc3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2003</creationdate><topic>Computer security</topic><topic>Cost function</topic><topic>Decision trees</topic><topic>Game theory</topic><topic>Information analysis</topic><topic>Information security</topic><topic>Instruments</topic><topic>Operating systems</topic><topic>Risk analysis</topic><topic>Statistical analysis</topic><toplevel>online_resources</toplevel><creatorcontrib>Nesterov, S.A.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Nesterov, S.A.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>The formal framework of security infrastructure design</atitle><btitle>IEEE/Siberian Conference on Control and Communications (IEEE Cat. No.03EX687)</btitle><stitle>SIBCON</stitle><date>2003</date><risdate>2003</risdate><spage>116</spage><epage>118</epage><pages>116-118</pages><isbn>0780378547</isbn><isbn>9780780378544</isbn><abstract>The paper is devoted to developing of the formal framework of security infrastructure design, which considers not only technical, but also economical results of safeguards implementation to the computer system. The problem's solution is shared in two phases. During the fist phase we must compose the set of security subsystem projects, which obey specified conditions and restrictions. That problem is treated using original set-theory model and backtracking algorithm. The goal of the second stage is selection of the optimal project from this set. On that stage game theory methods are used.</abstract><pub>IEEE</pub><doi>10.1109/SIBCON.2003.1335739</doi><tpages>3</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 0780378547 |
ispartof | IEEE/Siberian Conference on Control and Communications (IEEE Cat. No.03EX687), 2003, p.116-118 |
issn | |
language | eng |
recordid | cdi_ieee_primary_1335739 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Computer security Cost function Decision trees Game theory Information analysis Information security Instruments Operating systems Risk analysis Statistical analysis |
title | The formal framework of security infrastructure design |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T11%3A58%3A51IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=The%20formal%20framework%20of%20security%20infrastructure%20design&rft.btitle=IEEE/Siberian%20Conference%20on%20Control%20and%20Communications%20(IEEE%20Cat.%20No.03EX687)&rft.au=Nesterov,%20S.A.&rft.date=2003&rft.spage=116&rft.epage=118&rft.pages=116-118&rft.isbn=0780378547&rft.isbn_list=9780780378544&rft_id=info:doi/10.1109/SIBCON.2003.1335739&rft_dat=%3Cieee_6IE%3E1335739%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1335739&rfr_iscdi=true |