Fast Process Security Assessment Theory

نویسندگان

  • Korkut Uygun
  • Yinlun Huang
  • Helen H. Lou
چکیده

This communication introduces a comprehensive theory for process security assessment. The theory can quickly provide mathematically proven upper and lower bounds on minimum time to disaster (the time disaster conditions will be reached in worst-case scenarios). Computational efficiency and reliability are achieved by performing process security assessment based on a time-derivative–based approach, rather than conducting massive process dynamic simulations. Further, the methodology enables prioritizing the process variables critical to plant security. This facilitates pinpointing the possible reasons of a security-threatening situation, quantifying the importance of each disturbance factor on the system’s vulnerability, and creating a prioritized list of improvements/ counteractions for ensuring process security. Two runaway reactor examples are studied to demonstrate the methodology for security-threat analysis. © 2004 American Institute of Chemical Engineers AIChE J, 50: 2187–2202, 2004

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory

Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...

متن کامل

Assessment of BAM with ANP Approach; Case Study: Bank Sepah

In today's business environment in which coordination and adaptation with constant changes are the only ways of survival, real-time monitoring of activities and making the decisions accordingly are necessary. Since performance measurement cannot be managed independent of business processes, Business Activity Monitoring (BAM) systems should monitor performance metrics based on business processes...

متن کامل

Assessment of BAM with ANP Approach; Case Study: Bank Sepah

In today's business environment in which coordination and adaptation with constant changes are the only ways of survival, real-time monitoring of activities and making the decisions accordingly are necessary. Since performance measurement cannot be managed independent of business processes, Business Activity Monitoring (BAM) systems should monitor performance metrics based on business processes...

متن کامل

Onm-6: Seeking Security in Surrogacy Motherhood:A Grounded Theory

s:2087:"Background: Surrogacy is one of the scientific revolutions in infertility domain in recent decades. Despite the widespread use of this technique especially surrogacy in Iran, studies about experiences of its clients are rare. Optimal care of commissioning mothers in surrogacy, requires proper understanding the process of motherhood. The aim of this study was exploration of the motherhoo...

متن کامل

A Research for Cloud Computing Security Risk Assessment

In order to solve the problem of the complexity of the process and the accuracy of evaluation results in cloud computing security risk assessment, the hierarchical holographic modeling method is applied to cloud computing risk identification phase, so as to clearly capture the cloud computing risk factors through a comprehensive analysis of cloud computing security domains. Moreover, with cloud...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004