Visible to the public Requirement analysis and descriptive specification for exploratory evaluation of information system security protection capability

TitleRequirement analysis and descriptive specification for exploratory evaluation of information system security protection capability
Publication TypeConference Paper
Year of Publication2017
AuthorsZhang, M., Chen, Q., Zhang, Y., Liu, X., Dong, S.
Conference Name2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)
ISBN Number978-1-4673-8979-2
KeywordsAnalytical models, Business, Collaboration, Computational modeling, description specification, descriptive specification, exploratory evaluation, exploratory evaluation description problem, exploratory evaluation process, exploratory evaluation requirements, formal specification, granular computing, Granular Computing theory, information system security protection capability, information system structure model, Information systems, policy-based governance, protection policy, protective equipment, pubcrawl, requirement analysis, security, security of data, Security Policies Analysis, specification description, Uncertainty
Abstract

Exploratory evaluation is an effective way to analyze and improve the security of information system. The information system structure model for security protection capability is set up in view of the exploratory evaluation requirements of security protection capability, and the requirements of agility, traceability and interpretation for exploratory evaluation are obtained by analyzing the relationship between information system, protective equipment and protection policy. Aimed at the exploratory evaluation description problem of security protection capability, the exploratory evaluation problem and exploratory evaluation process are described based on the Granular Computing theory, and a general mathematical description is established. Analysis shows that the standardized description established meets the exploratory evaluation requirements, and it can provide an analysis basis and description specification for exploratory evaluation of information system security protection capability.

URLhttps://ieeexplore.ieee.org/document/8054338/
DOI10.1109/IAEAC.2017.8054338
Citation Keyzhang_requirement_2017