The Information System Security TechnologyScheme Based on Genetic Algorithm
DOI:
CSTR:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    How can the organizations form optimum system security technology schemes to reduce the threat caused by vulnerabilities of their information systems is the key problem in information security management field. On the basis of describing the multi-goal decision-making model of the information system security technology scheme, this paper presented a self-adaptive genetic algorithm for security technology scheme of the information system enabling the organizations to choose the minimal-cost security technology scheme that can address the maximum vulnerabilities. And examples are given to demonstrate the validity of the algorithm.

    Reference
    Related
    Cited by
Get Citation
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:June 09,2005
  • Revised:
  • Adopted:
  • Online: April 10,2013
  • Published:
Article QR Code