基于拟熵的信息安全度模糊综合评估及实证研究

庞海珍 马晓英

图书情报工作 ›› 2010, Vol. 54 ›› Issue (20) : 53-56,27.

PDF(509 KB)
PDF(509 KB)
图书情报工作 ›› 2010, Vol. 54 ›› Issue (20) : 53-56,27.
情报研究

基于拟熵的信息安全度模糊综合评估及实证研究

作者信息 +

The Quasi-entropy Fuzzy Comprehensive Evaluation and Empirical Study of Information Security Satisfaction

Author information +
文章历史 +

摘要

针对信息安全评估的繁复性和评价信息的模糊性,引入拟熵权模糊综合评估法,克服熵权法计算量较大和算法有时不可行的缺陷,为此类问题的求解提供一个新的思路和方法。为便于应用,给出算法流程图。最后结合实例,将拟熵权与熵权、Delphi法赋权的模糊综合评估结果进行比较,表明拟熵权法的隶属度最高。通过编制Matlab程序实现信息安全评估的半自动化,以减轻繁复的评估工作。

Abstract

In view of the complexity in the evaluation of information security and the fuzziness of the information to be evaluated, this paper introduces the quasi-entropy weight fuzzy comprehensive evaluation method that avoids the large calculation amount in the traditional entropy weight method while overcomes the drawback of algorithm sometimes being not feasible. The method initiates a new idea to solve this kind of questions. For the convenience of application, the paper presents the algorithm flow chart. And further, combined with practical examples the results of quasi-entropy weight method, traditional entropy weight method and Delphi weighting of fuzzy comprehensive evaluations method are compared in details. It follows that the membership degree of the quasi-entropy weigh method are the highest. By using the Matlab program, the authors realize semi-automation of the information security evaluations and lighten the complicated evaluation work.

关键词

信息安全度 / 模糊综合评估 / 拟熵 / Matlab程序 / 算法流程图

Key words

information security satisfaction / fuzzy comprehensive evaluation / quasi-entropy / Matlab program / arithmetic flow chart

引用本文

导出引用
庞海珍 马晓英. 基于拟熵的信息安全度模糊综合评估及实证研究[J]. 图书情报工作, 2010, 54(20): 53-56,27
Pang Haizhen Ma Xiaoying. The Quasi-entropy Fuzzy Comprehensive Evaluation and Empirical Study of Information Security Satisfaction[J]. Library and Information Service, 2010, 54(20): 53-56,27

参考文献

[1] Son H, Seong P. A software safety evaluation method based on fuzzy colored petrinets [C] //Proc of International Conference on Fuzzy Systems. Seoul Korea,1999,2:830-834. [2] Tah J H M, Carr V. A proposal for construction project risk assessment using fuzzy logic [ J].Construction Management and Economics,2000,18(44):491-500. [3] Chen S J, Chen S M. Fuzzy risk analysis based on similarity measures of generalized fuzzy numbers [J].IEEE Transactions on Fuzzy Systems,2003,11(5):45-55. [4] 任帅,慕德俊,朱灵波.一种基于灰色层次分析法的信息安全评估模型[J].计算机应用,2006,26(9):2111-2113. [5] 程建华,靖继鹏.信息安全风险综合评价指标体系构建和评价方法[J].现代情报,2008,(5):65-69. [6] 孙卫红,何德全.从定性到定量的信息安全模糊综合评估[J].系统工程理论与实践,2006,26 (12):93-98. [7] 罗佳,杨世平.基于熵权系数法的信息安全模糊风险评估[J].计算机技术与发展,2009,19(10):177-180,188. [8] 马晓英,张国海,韩淑芬.高校图书馆读者满意度的熵权模糊综合评判[J].情报科学,2007,25(5):715-719. [9] 马晓英,韩淑芬,孙多青.图书馆读者满意度的拟熵权模糊综合评判[J].现代图书情报技术,2008,(6):95-99. [10] 马晓英.图书馆网站质量评价的新方法及计算机实现[J].情报理论与实践,2009,(7):74-77. [11] 孙多青,霍伟.基于规则灵敏度的模糊逻辑系统结构简化方法[J].北京航空航天大学学报,2002,28(2):198-201. [12] 孙多青.不确定系统的模糊自适应控制与辨识新方法研究[D].北京:北京航空航天大学,2002:15-23. [13] 蔡勉,卫鸿儒.信息系统安全理论与技术[M].北京:北京工业大学出版社,2006:300. [14] 周喜荣,刘善存,邱菀华.熵在决策分析中的应用综述[J].控制与决策,2008,23(4):361-366,371. [15] 蔡勉,卫鸿儒.信息系统安全理论与技术[M].北京:北京工业大学出版社,2006:6.

基金

秦皇岛市科研与发展计划项目“中国传统文化与和谐社会构建研究”

PDF(509 KB)

1224

Accesses

0

Citation

Detail

段落导航
相关文章

/