Paper
13 April 2023 ICS information security evaluation method based on fuzzy analytic hierarchy process
Yongsheng Liu, Hai Yu, Wenjie Zhang, Danni Wang, Jinlei Zhou, Meng Meng
Author Affiliations +
Proceedings Volume 12605, 2022 2nd Conference on High Performance Computing and Communication Engineering (HPCCE 2022); 1260517 (2023) https://doi.org/10.1117/12.2673600
Event: Second Conference on High Performance Computing and Communication Engineering, 2022, Harbin, China
Abstract
With the increasing scale of applications and system programs and the increased processing capacity of software, in order to improve the efficiency of software, more and more information-sharing technologies are adopted. There are more and more loopholes in large-scale information-sharing, mainly because of the uncertainty of information-sharing scheduling, which leads to great uncertainty in the control flow of programs. In This paper, the theory of fuzzy cooperation evaluation is applied to the research. Through the analysis of the participants in data-sharing and their fuzzy cooperation relationships, the fuzzy cooperation evaluation model of data-sharing is constructed based on the degree of participants' participation. The benefit allocation model of data-sharing subjects is constructed by using the fuzzy Shapley value and Banzhaf-Coleman right index. It provides a new research perspective and ideas for the smooth long-term practice of data-sharing and the equilibrium of its rights and interests.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Yongsheng Liu, Hai Yu, Wenjie Zhang, Danni Wang, Jinlei Zhou, and Meng Meng "ICS information security evaluation method based on fuzzy analytic hierarchy process", Proc. SPIE 12605, 2022 2nd Conference on High Performance Computing and Communication Engineering (HPCCE 2022), 1260517 (13 April 2023); https://doi.org/10.1117/12.2673600
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Fuzzy logic

Matrices

Analytics

Information security

Analytical research

Computer security

Data modeling

Back to Top