Requirement analysis and descriptive specification for exploratory evaluation of information system security protection capability
Title | Requirement analysis and descriptive specification for exploratory evaluation of information system security protection capability |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Zhang, M., Chen, Q., Zhang, Y., Liu, X., Dong, S. |
Conference Name | 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC) |
ISBN Number | 978-1-4673-8979-2 |
Keywords | Analytical models, Business, Collaboration, Computational modeling, description specification, descriptive specification, exploratory evaluation, exploratory evaluation description problem, exploratory evaluation process, exploratory evaluation requirements, formal specification, granular computing, Granular Computing theory, information system security protection capability, information system structure model, Information systems, policy-based governance, protection policy, protective equipment, pubcrawl, requirement analysis, security, security of data, Security Policies Analysis, specification description, Uncertainty |
Abstract | Exploratory evaluation is an effective way to analyze and improve the security of information system. The information system structure model for security protection capability is set up in view of the exploratory evaluation requirements of security protection capability, and the requirements of agility, traceability and interpretation for exploratory evaluation are obtained by analyzing the relationship between information system, protective equipment and protection policy. Aimed at the exploratory evaluation description problem of security protection capability, the exploratory evaluation problem and exploratory evaluation process are described based on the Granular Computing theory, and a general mathematical description is established. Analysis shows that the standardized description established meets the exploratory evaluation requirements, and it can provide an analysis basis and description specification for exploratory evaluation of information system security protection capability. |
URL | https://ieeexplore.ieee.org/document/8054338/ |
DOI | 10.1109/IAEAC.2017.8054338 |
Citation Key | zhang_requirement_2017 |
- information system security protection capability
- uncertainty
- specification description
- Security Policies Analysis
- security of data
- security
- requirement analysis
- pubcrawl
- protective equipment
- protection policy
- policy-based governance
- Information systems
- information system structure model
- Analytical models
- Granular Computing theory
- granular computing
- Formal Specification
- exploratory evaluation requirements
- exploratory evaluation process
- exploratory evaluation description problem
- exploratory evaluation
- descriptive specification
- description specification
- Computational modeling
- collaboration
- Business