The formal framework of security infrastructure design

The paper is devoted to developing of the formal framework of security infrastructure design, which considers not only technical, but also economical results of safeguards implementation to the computer system. The problem's solution is shared in two phases. During the fist phase we must compos...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Nesterov, S.A.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 118
container_issue
container_start_page 116
container_title
container_volume
creator Nesterov, S.A.
description The paper is devoted to developing of the formal framework of security infrastructure design, which considers not only technical, but also economical results of safeguards implementation to the computer system. The problem's solution is shared in two phases. During the fist phase we must compose the set of security subsystem projects, which obey specified conditions and restrictions. That problem is treated using original set-theory model and backtracking algorithm. The goal of the second stage is selection of the optimal project from this set. On that stage game theory methods are used.
doi_str_mv 10.1109/SIBCON.2003.1335739
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_1335739</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1335739</ieee_id><sourcerecordid>1335739</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-ef937d73482640a0ba73a233d2f0dcb922758c7c7e5732c7f4b4defff9ca8ddc3</originalsourceid><addsrcrecordid>eNotj8tqwzAURAWlkDbNF2SjH7Ar68q-1rI1fQRCsqj3QZauUrVxXCSbkr-voZnNwFkMZxhbFyIvCqEfPzbPzX6XSyEgLwBKBH3D7gXWArAuFS7YKqUvMUeVSlbFHavaT-J-iL05cR9NT79D_OaD54nsFMN44eE88zTGyY5TJO4oheP5gd16c0q0uvaSta8vbfOebfdvm-ZpmwUtxoy8BnQIqpaVEkZ0BsFIACe9cLbTUmJZW7RIs6m06FWnHHnvtTW1cxaWbP0_G4jo8BNDb-LlcH0Gf1ueRak</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>The formal framework of security infrastructure design</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Nesterov, S.A.</creator><creatorcontrib>Nesterov, S.A.</creatorcontrib><description>The paper is devoted to developing of the formal framework of security infrastructure design, which considers not only technical, but also economical results of safeguards implementation to the computer system. The problem's solution is shared in two phases. During the fist phase we must compose the set of security subsystem projects, which obey specified conditions and restrictions. That problem is treated using original set-theory model and backtracking algorithm. The goal of the second stage is selection of the optimal project from this set. On that stage game theory methods are used.</description><identifier>ISBN: 0780378547</identifier><identifier>ISBN: 9780780378544</identifier><identifier>DOI: 10.1109/SIBCON.2003.1335739</identifier><language>eng</language><publisher>IEEE</publisher><subject>Computer security ; Cost function ; Decision trees ; Game theory ; Information analysis ; Information security ; Instruments ; Operating systems ; Risk analysis ; Statistical analysis</subject><ispartof>IEEE/Siberian Conference on Control and Communications (IEEE Cat. No.03EX687), 2003, p.116-118</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1335739$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,4050,4051,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1335739$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Nesterov, S.A.</creatorcontrib><title>The formal framework of security infrastructure design</title><title>IEEE/Siberian Conference on Control and Communications (IEEE Cat. No.03EX687)</title><addtitle>SIBCON</addtitle><description>The paper is devoted to developing of the formal framework of security infrastructure design, which considers not only technical, but also economical results of safeguards implementation to the computer system. The problem's solution is shared in two phases. During the fist phase we must compose the set of security subsystem projects, which obey specified conditions and restrictions. That problem is treated using original set-theory model and backtracking algorithm. The goal of the second stage is selection of the optimal project from this set. On that stage game theory methods are used.</description><subject>Computer security</subject><subject>Cost function</subject><subject>Decision trees</subject><subject>Game theory</subject><subject>Information analysis</subject><subject>Information security</subject><subject>Instruments</subject><subject>Operating systems</subject><subject>Risk analysis</subject><subject>Statistical analysis</subject><isbn>0780378547</isbn><isbn>9780780378544</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2003</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj8tqwzAURAWlkDbNF2SjH7Ar68q-1rI1fQRCsqj3QZauUrVxXCSbkr-voZnNwFkMZxhbFyIvCqEfPzbPzX6XSyEgLwBKBH3D7gXWArAuFS7YKqUvMUeVSlbFHavaT-J-iL05cR9NT79D_OaD54nsFMN44eE88zTGyY5TJO4oheP5gd16c0q0uvaSta8vbfOebfdvm-ZpmwUtxoy8BnQIqpaVEkZ0BsFIACe9cLbTUmJZW7RIs6m06FWnHHnvtTW1cxaWbP0_G4jo8BNDb-LlcH0Gf1ueRak</recordid><startdate>2003</startdate><enddate>2003</enddate><creator>Nesterov, S.A.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>2003</creationdate><title>The formal framework of security infrastructure design</title><author>Nesterov, S.A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-ef937d73482640a0ba73a233d2f0dcb922758c7c7e5732c7f4b4defff9ca8ddc3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2003</creationdate><topic>Computer security</topic><topic>Cost function</topic><topic>Decision trees</topic><topic>Game theory</topic><topic>Information analysis</topic><topic>Information security</topic><topic>Instruments</topic><topic>Operating systems</topic><topic>Risk analysis</topic><topic>Statistical analysis</topic><toplevel>online_resources</toplevel><creatorcontrib>Nesterov, S.A.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Nesterov, S.A.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>The formal framework of security infrastructure design</atitle><btitle>IEEE/Siberian Conference on Control and Communications (IEEE Cat. No.03EX687)</btitle><stitle>SIBCON</stitle><date>2003</date><risdate>2003</risdate><spage>116</spage><epage>118</epage><pages>116-118</pages><isbn>0780378547</isbn><isbn>9780780378544</isbn><abstract>The paper is devoted to developing of the formal framework of security infrastructure design, which considers not only technical, but also economical results of safeguards implementation to the computer system. The problem's solution is shared in two phases. During the fist phase we must compose the set of security subsystem projects, which obey specified conditions and restrictions. That problem is treated using original set-theory model and backtracking algorithm. The goal of the second stage is selection of the optimal project from this set. On that stage game theory methods are used.</abstract><pub>IEEE</pub><doi>10.1109/SIBCON.2003.1335739</doi><tpages>3</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 0780378547
ispartof IEEE/Siberian Conference on Control and Communications (IEEE Cat. No.03EX687), 2003, p.116-118
issn
language eng
recordid cdi_ieee_primary_1335739
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Computer security
Cost function
Decision trees
Game theory
Information analysis
Information security
Instruments
Operating systems
Risk analysis
Statistical analysis
title The formal framework of security infrastructure design
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T11%3A58%3A51IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=The%20formal%20framework%20of%20security%20infrastructure%20design&rft.btitle=IEEE/Siberian%20Conference%20on%20Control%20and%20Communications%20(IEEE%20Cat.%20No.03EX687)&rft.au=Nesterov,%20S.A.&rft.date=2003&rft.spage=116&rft.epage=118&rft.pages=116-118&rft.isbn=0780378547&rft.isbn_list=9780780378544&rft_id=info:doi/10.1109/SIBCON.2003.1335739&rft_dat=%3Cieee_6IE%3E1335739%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1335739&rfr_iscdi=true