English  |  正體中文  |  简体中文  |  Items with full text/Total items : 26353/26950 (98%)
Visitors : 11216100      Online Users : 337
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://ir.lib.ksu.edu.tw/handle/987654321/5027


    Title: A Fuzzy Outranking Approach in Analyzing Risks in Web Security
    Authors: Ping Wang
    Kuo-Ming Chao
    Chun-Lung Huang
    Chi-Chun Lo
    王平
    Keywords: Fuzzy Outranking
    Risk Analysis
    Web Security
    Pseudo-Order
    POPM
    Date: 2007
    Issue Date: 2009-09-14 16:21:15 (UTC+8)
    Abstract: Risk analysis is the basis of proactive security requirements. To effectively protect security in the web environment, analyzing risks of web sites is an essential and important process for identifying known and potential vulnerabilities, threats and its impact losses. In fact, it is relatively difficult for users to collect adequate data to estimate the full vulnerabilities and probability of threats in the Internet, due to the rapid change of the emerging malicious attack and the new computers vulnerabilities. Therefore, a new fuzzy risk assessment model was developed to evaluate the risk of web security under incomplete information. The proposed method extends Pseudo-Order Preference Model (POPM) to estimate the imprecise risk based on richness of information and to determine their ranking using weighted additive rule. Finally, a case study on security analysis for the e-commerce applications is given as illustration of our approach.
    Appears in Collections:[資訊管理系所] 期刊論文

    Files in This Item:

    File Description SizeFormat
    (王平)A Fuzzy Outranking Approach for Analyzing Risks of Web Security_PingWang cameraready_.pdf131KbAdobe PDF227View/Open


    All items in KSUIR are protected by copyright, with all rights reserved.


    本網站之所有圖文內容授權為崑山科技大學圖書資訊館所有,請勿任意轉載或擷取使用。
    ©Kun Shan University Library and Information Center
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback