Skip to main content

Recognition and Evaluation of Information Security Based on Non-optimum Analysis

  • Conference paper
  • First Online:
Software Engineering and Knowledge Engineering: Theory and Practice

Part of the book series: Advances in Intelligent and Soft Computing ((AINSC,volume 115))

  • 1204 Accesses

Abstract

This paper discusses the problems of non-optimum recognition, and establishes the system of non-optimum evaluation in the field of information security, based on non-optimum theory of systems. According to researches, the recognition and evaluation of non-optimum information directly decide the attributes of information security. It is an effective method to evaluate the information security that the non-optimum recognition about information systems is in the past, the present and future tense.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ping, H.: Theories and Methods of Non-optimum Analysis on Systems. Journal of Engineering Science 1(1), 73–80 (2004)

    MathSciNet  Google Scholar 

  2. Ping, H.: Non-optimum system theory and methods. In: First Joint IFSA-EC Workshop (1986)

    Google Scholar 

  3. Cai, W.: Extension management engineering and applications. International Journal of Operations and Quantitative Management 5(2), 59–72 (1999)

    Google Scholar 

  4. He, P.: System Non-optimum Analysis and Extension Optimum Theory. In: Chen, G. (ed.) Proc. of the Int’l Conf. on Systems Science and Systems Engineering, pp. 131–137 (2003)

    Google Scholar 

  5. Linstone, H.: Multiple Perspectives for Decision Making, pp. 10–17. North Holland Publishing, New York (1984)

    Google Scholar 

  6. Linstone, H.: Multiple Perspectives: Concepts, Applications, And User Guidelines. Systems Practice 2(2), 307–331 (1989)

    Article  Google Scholar 

  7. Ping, H.: Method of System Non-optimum Analysis in Crisis Management. In: Proc. of Second International Conference of Information System for Crisis Response and Management, pp. 640–645 (2007)

    Google Scholar 

  8. Ping, H.: The Method of Non-optimum Analysis on Risk Management System. In: Van de Walle, B. (ed.) Proc. of the Int’l Conf. ISCRAM 2008, pp. 604–609 (2008)

    Google Scholar 

  9. Ping, H.: Methods of Systems Non-optimum Analysis Based on Intervenient Optimum. In: Wang, Q. (ed.) Proc. of the Int’l Conf. on System Science, Management Science and System Dynamic, pp. 661–670 (2007)

    Google Scholar 

  10. Qu, Z., He, P.: Method of Non-optimum Analysis on Risk Control System. Journal of Software 4(4), 374–381 (2009)

    Article  Google Scholar 

  11. He, P., Qu, Z.: Comparison Computing Based on Sub-optimum Analysis:A Guide System of Network Security. Journal of Networks 4(8), 779–786 (2009)

    Article  Google Scholar 

  12. Qu, Z., He, P.: Intelligence Analysis Based on Intervenient Optimum learning Guide System. In: International Conference on Computational Intelligence and Natural Computing, pp. 336–339. IEEE Computer Society (2009)

    Google Scholar 

  13. He, P., Qu, Z.: Theories and Methods of Sub-optimum Based on Non-optimum Analysis. ICIC Express Letters 4(3), 237–242

    Google Scholar 

  14. He, J., He, P.: A New Intelligence Analysis Method Based on Sub-optimum Learning Model. In: Proc. of the Int’l Conf. International Conference on Future Computer and Communication, pp. 658–661. IEEE Computer Society (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lihua Duan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag GmbH Berlin Heidelberg

About this paper

Cite this paper

Duan, L. (2012). Recognition and Evaluation of Information Security Based on Non-optimum Analysis. In: Wu, Y. (eds) Software Engineering and Knowledge Engineering: Theory and Practice. Advances in Intelligent and Soft Computing, vol 115. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25349-2_45

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25349-2_45

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25348-5

  • Online ISBN: 978-3-642-25349-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics