2016
DOI: 10.5815/ijisa.2016.12.07
|View full text |Cite
|
Sign up to set email alerts
|

Analytical Assessment of Security Level of Distributed and Scalable Computer Systems

Abstract: Abstract-The article deals with the issues of the security of distributed and scalable computer systems based on the risk-based approach. The main existing methods for predicting the consequences of the dangerous actions of the intrusion agents are described. There is shown a generalized structural scheme of job manager in the context of a risk-based approach. Suggested analytical assessments for the security risk level in the distributed computer systems allow performing the critical t ime values forecast for… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
4
4
1

Relationship

2
7

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…Information security systems are of great importance for business organizations as they become the main key to planning and management in modern enterprises to endure the safety, availability, and confidentiality of information [6,7]. The internal and external security threats made the international organizations seek to adopt specific security policy standards that draw up an integrated policy to put the concept of information security into practice at institutions, from analysis of risks to the application of security controls to minimize these risks [8,9].…”
Section: A Information Security Assessment: Standards and Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…Information security systems are of great importance for business organizations as they become the main key to planning and management in modern enterprises to endure the safety, availability, and confidentiality of information [6,7]. The internal and external security threats made the international organizations seek to adopt specific security policy standards that draw up an integrated policy to put the concept of information security into practice at institutions, from analysis of risks to the application of security controls to minimize these risks [8,9].…”
Section: A Information Security Assessment: Standards and Modelsmentioning
confidence: 99%
“…Calculate consistency index (CI) and consistency ratio (CR) to determine the consistency level from each expert. Aggregate the pairwise comparison matrices of experts by using the fuzzy geometric mean method of Buckley (6) to take the average values to obtain the combined comparison matrix for the whole group of experts. The local weight vector of factors is determined by using formulas (7) to (9).…”
Section: The Proposed Model For Measuring Ismimentioning
confidence: 99%
“…Studies in [10] showed that increase in the reliability of diagnosis D can be achieved by definition (or assignment) of correct subset of nodes…”
Section: Abstract: Wireless Sensor Network Characteristic Number Dementioning
confidence: 99%
“…The increase in the number of users of such systems leads to the fact that DCS are constantly increasing in scale. In addition, such systems are designed to serve simultaneously a large number of users, which requires efficient resource control techniques in such systems [1,2].…”
Section: Introductionmentioning
confidence: 99%