CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

Security based Risk Management based on Multi-Objectives Model using QPSO

Published on December 2014 by Elrasheed Ismail Sultan, Faisal Alamri, Kunna Mohamed, Noraziah. A, Ahmed N. Abdalla, Gamal Awad
Majan College International Conference
Foundation of Computer Science USA
MIC - Number 1
December 2014
Authors: Elrasheed Ismail Sultan, Faisal Alamri, Kunna Mohamed, Noraziah. A, Ahmed N. Abdalla, Gamal Awad
b9f267ee-de43-4a83-9ca0-5aaa1e221b88

Elrasheed Ismail Sultan, Faisal Alamri, Kunna Mohamed, Noraziah. A, Ahmed N. Abdalla, Gamal Awad . Security based Risk Management based on Multi-Objectives Model using QPSO. Majan College International Conference. MIC, 1 (December 2014), 39-42.

@article{
author = { Elrasheed Ismail Sultan, Faisal Alamri, Kunna Mohamed, Noraziah. A, Ahmed N. Abdalla, Gamal Awad },
title = { Security based Risk Management based on Multi-Objectives Model using QPSO },
journal = { Majan College International Conference },
issue_date = { December 2014 },
volume = { MIC },
number = { 1 },
month = { December },
year = { 2014 },
issn = 0975-8887,
pages = { 39-42 },
numpages = 4,
url = { /proceedings/mic/number1/19036-1415/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Majan College International Conference
%A Elrasheed Ismail Sultan
%A Faisal Alamri
%A Kunna Mohamed
%A Noraziah. A
%A Ahmed N. Abdalla
%A Gamal Awad
%T Security based Risk Management based on Multi-Objectives Model using QPSO
%J Majan College International Conference
%@ 0975-8887
%V MIC
%N 1
%P 39-42
%D 2014
%I International Journal of Computer Applications
Abstract

Nowadays the security risk management play a crucial role, which is applied to the entire life cycle of information systems and communication technologies but still so many models for security risk management are non-practical, therefore, it should be measured and improved. In this paper, a novel approach, in which Analytic Hierarchy Process (AHP) and Quantum Particles Swarm Optimization (QPSO) can be combined with some changes, is presented. The method consists of; firstly, the analytic hierarchy structure of the risk management is constructed and the method of QPSO comprehensive judgment is improved according to the actual condition of the information security. Secondly, the risk degree put forward is QPSO estimation of the risk probability, the risk impact severity and risk uncontrollability. Finally, it gives examples to prove that this method Multi Objectives Programming Methodology (MOPM) can be well applied to security risk management and provides reasonable data for constituting the risk control strategy of the information systems security. Based on the risk management results, the targeted safety measures are taken, and the risk is transferred and reduced, which is controlled within an acceptable range.

References
  1. Wang Yingmei, Wang Shengkai and Cheng Xiangyun, Security Risk Management of Information System, Publishing House of Electronic Industry, Beijing, 2007.
  2. ISO/IEC15408, Common Criteria for IT Security Evaluation. Version 2. 1. The International Organization for Standardization, 1999.
  3. Common Criteria for Information Technology Security Evaluation, v3. 0, June 2005.
  4. M. Kendall, Rank correlation methods. 3rd ed. ; 1962. NY.
  5. Y. Deng, W. K. Shi, F. Du, A new similarity measure of generalized fuzzy numbers and its application to pattern recognition, Pattern Recognition Letters, vol. 24, no. 8, pp. 875-883, 2004.
  6. F. Du, W. K. Shi and Y. Deng, "New similarity measure of generalized fuzzy numbers," Journal of Shanghai Jiaotong University, vol. 39, no. 8, pp. 614-617, 2005.
  7. Lu Simei, Zhang Jianlin, Security Risk Management Model Based on AHP/D-S Evidence Theory, International Forum on Information Technology and Applications, 2009.
  8. Marc J. Schniederjans a, Tim Garvin, Using the Analytic Hierarchy Process and multi-objective programming for the selection of cost drivers in activity-based costing.
  9. Dong-Mei Zhao, Jing-Hong Wang, Using Fuzzy Logic And Entropy Theory To Risk Management Of The Information Security, Proceedings of the Fourth International Conference on Machine Learning and Cybernetics, Guangzhou, 2005.
  10. Omkarprasad S Vaidya, Sushil Kumar, Analytic hierarchy process: An overview of applications, European Journal of Operational Research 169 (2006)
Index Terms

Computer Science
Information Sciences

Keywords

Risk Management Information Security Qpso Analytic Hierarchy Process Multi-objectives Model.