Trust-based security-level evaluation method for dynamic service-oriented environments

2015 ◽  
Vol 27 (18) ◽  
pp. 5700-5718 ◽  
Author(s):  
Grzegorz Kołaczek ◽  
Krzysztof Juszczyszyn ◽  
Paweł Świątek ◽  
Adam Grzech ◽  
Patryk Schauer ◽  
...  
2011 ◽  
Vol 474-476 ◽  
pp. 527-530
Author(s):  
Yu Jiao Wang ◽  
Hai Yun Lin

The basis to build effective network security protection is to reasonably evaluate on network security. Based on analysis on shortcomings of existing network security evaluation methods, the paper built network security evaluation index system according to CC specifications. The advantages of local variable weight comprehensive method were analyzed and the method of network security evaluation based on combination of AHP and local variable weight was presented. The evaluation example on some network elements indicates that the method evaluate on overall information security level, so that the evaluation result be objective and reasonable.


Transport ◽  
2009 ◽  
Vol 24 (2) ◽  
pp. 143-153 ◽  
Author(s):  
Wei Liu ◽  
Huan Xu ◽  
Xin Zhao

Agility is regarded as one of the core capabilities and the developing trend of supply chains and their enterprises. Along with the development of economical globalization, supply chain management and containerization as well as container ports as a part of supply chain take more roles like logistics or distribution centers. Under this background, the container terminal should have superior response and develop agility. The main goal of this paper is to emphasize and illustrate the importance and imminence of implementing agility in container terminals. To achieve this goal, the analysis of the economies of scale in the container terminal is presented. In this paper, however, more attention will be paid to agile service oriented shipping companies. The concept and characters of agile service in the container terminal is illustrated. The paper also focuses on the agile organizational structure of the container terminal. Finally, the fuzzy quality synthetic evaluation method is given to evaluate the performance level of agile service in container terminal oriented shipping companies.


2012 ◽  
Vol 605-607 ◽  
pp. 2311-2317 ◽  
Author(s):  
Ke Wei Zhang

This paper proposes a comprehensive risk assessment index system for Smart Grid cyber security, including five first-level indicators such as entity and environment security, management security, data security, software security and communication security. Every indicator includes specific sub factors. The cyber security risks for Smart Grid are emphatically analysed. The paper integrates AHP with Fuzzy evaluation method, through which the weight of each layer and the risk assessment matrix are determined. Practical case study shows that cyber security level of the Smart Grid is good, but it needs improvement and reinforcement in organization system, data signature, data backup and intrusion detection system.


2016 ◽  
Vol 13 (3) ◽  
pp. 779-807 ◽  
Author(s):  
Mario Berón ◽  
Hernán Bernardis ◽  
Enrique Miranda ◽  
Daniel Riesco ◽  
João Varanda-Pereira ◽  
...  

Web Services (WS) are fundamental software artifacts for building service oriented applications and they are usually reused by others. Therefore they must be analyzed and comprehended for maintenance tasks: identification of critical parts, bug fixing, adaptation and improvement. In this article, WSDLUD a method aimed at measuring a priori the understanding degree (UD) of WSDL (Web Service Description Language) descriptions is presented. In order to compute UD several criteria useful to measure the understanding?s complexity of WSDL descriptions must be defined. These criteria are used by LSP (Logic Scoring of Preference), a multicriteria evaluation method, for producing a Global Preference value that indicates the satisfaction level of the WSDL description regarding the evaluation focus, in this case, the understanding degree. All the criteria information required by LSP is extracted from WSDL descriptions by using static analysis techniques and processed by specific algorithms which allow gathering semantic information. This process allows to obtain a priori information about the comprehension difficulty which proves our research hypotheses that states that it is possible to compute the understanding degree of a WSDL description.


2014 ◽  
Vol 1008-1009 ◽  
pp. 765-770
Author(s):  
Yi Gang Liu ◽  
Ye Qiu ◽  
Xiu Ning Wei ◽  
Yu Long Huang ◽  
Gan Biao Wang ◽  
...  

This paper proposes a risk evaluation method for human security during single power-supplying operation by use of expert evaluation, which serves for enhancing the human security level and power supplying reliability accordingly. The causes that affect human safety were distinguished into many factors which can be classified into 5 respects: man, machine, material, management and mediums, called ‘5M’ method. In order to quantize human safety risk, expert evaluation method was used to assess the human casualty accident occurrence probability value caused by these human security influencing factors. Then a practical evaluation method for human security risk was proposed by the product of human casualty accident (HCA) hazard with maximum probability and its probability value. Practicality of the proposed method was demonstrated on a real falling accident happened in 2005.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Hui-Qiong Deng ◽  
Jie Luo ◽  
Kuo-Chi Chang ◽  
Qin-Bin Li ◽  
Rong-Jin Zheng ◽  
...  

In recent years, the application of wireless sensor networks (WSN) in power systems has received a great deal of attention. As we all know, the most important issue for the power system is security and stability, especially due to the massive outages caused by cascading trips. Therefore, in today’s era, from the perspective of cascading trips, how to effectively use WSN to analyze and evaluate the security level of the power grid is an important direction for future power development. In this paper, an algorithm based on the WSN collection of online data to calculate the corresponding security level of the system is proposed for the cascading trip phenomenon, to achieve the online evaluation of the cascading trips. First, this paper proposes a hybrid layered network structure based on WSN for monitoring system and details the acquisition of power grid parameters by its acquisition layer. Secondly, combined with the manifestation of cascading trips and the action equation of current-type line backup protection, the mathematical representation of the grid cascading trips is given, and the mathematical form corresponding to the critical situation is strictly proved, and an index for evaluating the security level of the power grid is proposed and then further combined with the actual physical constraints of the power grid and the establishment of a mathematical model for calculating the security level of the grid cascading trips. For this model, this paper relies on evolution particle swarm optimization (EPSO) to give specific ideas for solving the model. Finally, a case analysis is performed by the IEEE39 node system and the results of the case show the effectiveness of the model and method.


Sign in / Sign up

Export Citation Format

Share Document