Petri Net Approach for Estimation the Information Systems Security Level in Any Logic Environment
At present, the security of information system is becoming one of the biggest challenges for all organizations. Information security is the protection of information and systems from unauthorized access, use, disclosure, modification, destruction in order to provide confidentiality, integrity, and a...
Uloženo v:
| Vydáno v: | 2019 53rd Annual Conference on Information Sciences and Systems (CISS) s. 1 - 6 |
|---|---|
| Hlavní autoři: | , , , |
| Médium: | Konferenční příspěvek |
| Jazyk: | angličtina |
| Vydáno: |
IEEE
01.03.2019
|
| Témata: | |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | At present, the security of information system is becoming one of the biggest challenges for all organizations. Information security is the protection of information and systems from unauthorized access, use, disclosure, modification, destruction in order to provide confidentiality, integrity, and availability. In this article, we discuss the methodology for estimating the security of information systems based on hybrid modeling in the Any Logic environment. A conceptual model of the information protection system is described in this paper. Moreover, a data structure that allows the behavior of agents to access the information system is presented here. |
|---|---|
| AbstractList | At present, the security of information system is becoming one of the biggest challenges for all organizations. Information security is the protection of information and systems from unauthorized access, use, disclosure, modification, destruction in order to provide confidentiality, integrity, and availability. In this article, we discuss the methodology for estimating the security of information systems based on hybrid modeling in the Any Logic environment. A conceptual model of the information protection system is described in this paper. Moreover, a data structure that allows the behavior of agents to access the information system is presented here. |
| Author | Oo, Myat Min Oo, Ko Ko Tun, Hein Lupin, Sergey |
| Author_xml | – sequence: 1 givenname: Hein surname: Tun fullname: Tun, Hein email: mr.heintun@gmail.com organization: National Research University of Electronic Technology, Zelenograd, Moscow, 124498, Russia – sequence: 2 givenname: Sergey surname: Lupin fullname: Lupin, Sergey organization: National Research University of Electronic Technology, Zelenograd, Moscow, 124498, Russia – sequence: 3 givenname: Ko Ko surname: Oo fullname: Oo, Ko Ko email: kko2006@gmail.com organization: University of Computer Studies, Yangon, Myanmar – sequence: 4 givenname: Myat Min surname: Oo fullname: Oo, Myat Min organization: University of Computer Studies, Yangon, Myanmar |
| BookMark | eNotj8FOhDAURWuiC2f0A4yb_gDYV4ZSloSgkhA1YRbuJqV9OE2GQkqdhL-XRFY35y5O7t2RWzc6JOQJWAzA8peybtuYM8hjKfKEpdkN2UHGJQCk8H1P1BcGb-kHBlpMkx-VPtN-9LSagx1UsKOj4Yy0dmu5cbvMAYeZtqh_vQ0LbfCKF2odLdwK44_VtHJX60c3oAsP5K5Xlxkft9yT42t1LN-j5vOtLosmsjkLkVTCHLRMDWPMdLlIsw6l4mgAU6VBCGQZ41x3vTAKdc-ZVJ3hHLg4yL5Lkj15_tdaRDxNfl3vl9N2OvkDsq1SoA |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/CISS.2019.8693057 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEL IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 172811151X 9781728111513 |
| EndPage | 6 |
| ExternalDocumentID | 8693057 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IL CBEJK RIE RIL |
| ID | FETCH-LOGICAL-i90t-8a6d4c85d000db9657be8a2ed1e5ac166e07022cbf6daecf208abd2212648fb33 |
| IEDL.DBID | RIE |
| IngestDate | Thu Jun 29 18:38:06 EDT 2023 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i90t-8a6d4c85d000db9657be8a2ed1e5ac166e07022cbf6daecf208abd2212648fb33 |
| PageCount | 6 |
| ParticipantIDs | ieee_primary_8693057 |
| PublicationCentury | 2000 |
| PublicationDate | 2019-March |
| PublicationDateYYYYMMDD | 2019-03-01 |
| PublicationDate_xml | – month: 03 year: 2019 text: 2019-March |
| PublicationDecade | 2010 |
| PublicationTitle | 2019 53rd Annual Conference on Information Sciences and Systems (CISS) |
| PublicationTitleAbbrev | CISS |
| PublicationYear | 2019 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| Score | 1.6855146 |
| Snippet | At present, the security of information system is becoming one of the biggest challenges for all organizations. Information security is the protection of... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 1 |
| SubjectTerms | Biological system modeling Computational modeling Information security Object oriented modeling perimeter security Petri nets security system |
| Title | Petri Net Approach for Estimation the Information Systems Security Level in Any Logic Environment |
| URI | https://ieeexplore.ieee.org/document/8693057 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LawIxEB5UeuipLVr6Joceu3VfeexRZKWFIoIevEkeE_CyFrv29zfJBqXQSy8hCSGBDJOZJPPNB_BcGm8FqbudUM2SsuAqqUpqE220TQubMa5lIJvg87lYr6tFD16OWBhEDMFn-Oqr4S_f7PTBP5WNhefto7wPfc55h9WKH5VZWo2n78ulj9Vywu_G_SJMCfZidvG_lS5hdALekcXRpFxBD5shyMB6RebYkknMAE6cq0lqp50d8JA4L45EYFFoxzzkZBnZ6ciHjw0i24ZMGtfwxx2pTxC3Eaxm9Wr6lkRmhGRbpW0iJDOlFtS488yoilGuUMgcTYZU6owxdIqc51pZZiRqm6dCKpM7K8VKYVVRXMOg2TV4AwTdJNRYqXnhPRGnraWSktpUZq7M8RaGfnc2n13ui03cmLu_u-_h3Augi9F6gEG7P-AjnOnvdvu1fwoC-wFyVJt8 |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LawMhEB7StNCe2pKUvuuhx26zD3XdYwgJCU2XQHLILbg6Qi6bkmz6-6u7klDopRdREQWHcUadbz6AV6qdFWT2dsIUD2iSFkFGmQmUViZMTMRTJWuyiTTPxXKZzVrwdsDCIGIdfIbvrlr_5euN2runsp5wvH0sPYFTRmkcNWgt_1UZhVlvMJnPXbSWFX8z8hdlSm0xRpf_W-sKukfoHZkdjMo1tLDsgKx5r0iOFen7HODEOptkaPWzgR4S68cRDy2q2z4TOZl7fjoyddFBZF2Sfmkb7sAjwyPIrQuL0XAxGAeeGyFYZ2EVCMk1VYJpe6LpIuMsLVDIGHWETKqIc7SqHMeqMFxLVCYOhSx0bO0Up8IUSXID7XJT4i0QtJMwbaRKE-eLWH2lhZTMhDKyZYx30HG7s_pqsl-s_Mbc_939Aufjxed0NZ3kHw9w4YTRRGw9Qrva7vEJztR3td5tn2vh_QCzy57D |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2019+53rd+Annual+Conference+on+Information+Sciences+and+Systems+%28CISS%29&rft.atitle=Petri+Net+Approach+for+Estimation+the+Information+Systems+Security+Level+in+Any+Logic+Environment&rft.au=Tun%2C+Hein&rft.au=Lupin%2C+Sergey&rft.au=Oo%2C+Ko+Ko&rft.au=Oo%2C+Myat+Min&rft.date=2019-03-01&rft.pub=IEEE&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FCISS.2019.8693057&rft.externalDocID=8693057 |