Decision on Replacing Components of Security Functions in COTS-Based Information Systems
نویسندگان
چکیده
As governments and enterprises adopt COTS-based information systems, COTS components must be selected to satisfy the security requirements of applied systems. However, the selection of security components is a trade-off between the confidence level in the components and the cost of replacing components. The higher confidence required of the security components leads to a higher cost in the selection process. Particularly, as governments take into account the confidence-level of COTS-based information systems, they must replace security functional components by their own developing components in high security environment. A decision method is needed to solve the trade-off between security and costs. This paper focuses on decision making to solve the problem of replacing the security functional components in COTS-based systems. This paper suggests an appropriate adaptation level and a cost-effective priority to replace security functional components in security environment. To make a cost effective decision on adapting security functional components, we develop a hierarchical model of information security technologies. Based on this, we determine the priority among security functional components using AHP (Analytic Hierarchy Process).
منابع مشابه
RFID-based decision support within maintenance management of urban tunnel systems
Efficiently, tracking information related to components, materials and equipment from the production/construction phase to operation and maintenance is a challenge in the industries. The industry environment is a natural fit for generating and utilizing instance-level data for decision support. Advanced electronic identification and data storage technologies e.g. radio frequency identification ...
متن کاملRFID-based decision support within maintenance management of urban tunnel systems
Efficiently, tracking information related to components, materials and equipment from the production/construction phase to operation and maintenance is a challenge in the industries. The industry environment is a natural fit for generating and utilizing instance-level data for decision support. Advanced electronic identification and data storage technologies e.g. radio frequency identification ...
متن کاملDesign of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method
Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...
متن کاملFuzzy COTS Selection for Modular Software Systems Based on Cohesion and Coupling under Multiple Applications Environment
Due to the rapid growth of development of component based software systems, the selection of optimal commercial-off-the-shelf (COTS) components has become the key of optimization techniques used for the purpose. In this paper, the authors use fuzzy mathematical programming (FMP) for developing bi-objective fuzzy optimization models that aims to select the best-fit COTS components for a modular ...
متن کاملArchitecture and Components for Data Management Security: NRL Perspective
The DoD urgently needs system architectures that will permit the use of commercial off-theshelf technology (COTS), including database management systems, without making the system as a whole vulnerable to COTS shortcomings and defects. Practical architectures to meet this need will, we believe, assign security functions that require high assurance to separate, simple components, and use COTS co...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005