Fast Process Security Assessment Theory
نویسندگان
چکیده
This communication introduces a comprehensive theory for process security assessment. The theory can quickly provide mathematically proven upper and lower bounds on minimum time to disaster (the time disaster conditions will be reached in worst-case scenarios). Computational efficiency and reliability are achieved by performing process security assessment based on a time-derivative–based approach, rather than conducting massive process dynamic simulations. Further, the methodology enables prioritizing the process variables critical to plant security. This facilitates pinpointing the possible reasons of a security-threatening situation, quantifying the importance of each disturbance factor on the system’s vulnerability, and creating a prioritized list of improvements/ counteractions for ensuring process security. Two runaway reactor examples are studied to demonstrate the methodology for security-threat analysis. © 2004 American Institute of Chemical Engineers AIChE J, 50: 2187–2202, 2004
منابع مشابه
Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory
Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...
متن کاملAssessment of BAM with ANP Approach; Case Study: Bank Sepah
In today's business environment in which coordination and adaptation with constant changes are the only ways of survival, real-time monitoring of activities and making the decisions accordingly are necessary. Since performance measurement cannot be managed independent of business processes, Business Activity Monitoring (BAM) systems should monitor performance metrics based on business processes...
متن کاملAssessment of BAM with ANP Approach; Case Study: Bank Sepah
In today's business environment in which coordination and adaptation with constant changes are the only ways of survival, real-time monitoring of activities and making the decisions accordingly are necessary. Since performance measurement cannot be managed independent of business processes, Business Activity Monitoring (BAM) systems should monitor performance metrics based on business processes...
متن کاملOnm-6: Seeking Security in Surrogacy Motherhood:A Grounded Theory
s:2087:"Background: Surrogacy is one of the scientific revolutions in infertility domain in recent decades. Despite the widespread use of this technique especially surrogacy in Iran, studies about experiences of its clients are rare. Optimal care of commissioning mothers in surrogacy, requires proper understanding the process of motherhood. The aim of this study was exploration of the motherhoo...
متن کاملA Research for Cloud Computing Security Risk Assessment
In order to solve the problem of the complexity of the process and the accuracy of evaluation results in cloud computing security risk assessment, the hierarchical holographic modeling method is applied to cloud computing risk identification phase, so as to clearly capture the cloud computing risk factors through a comprehensive analysis of cloud computing security domains. Moreover, with cloud...
متن کامل