Abstract
This paper discusses the problems of non-optimum recognition, and establishes the system of non-optimum evaluation in the field of information security, based on non-optimum theory of systems. According to researches, the recognition and evaluation of non-optimum information directly decide the attributes of information security. It is an effective method to evaluate the information security that the non-optimum recognition about information systems is in the past, the present and future tense.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ping, H.: Theories and Methods of Non-optimum Analysis on Systems. Journal of Engineering Science 1(1), 73–80 (2004)
Ping, H.: Non-optimum system theory and methods. In: First Joint IFSA-EC Workshop (1986)
Cai, W.: Extension management engineering and applications. International Journal of Operations and Quantitative Management 5(2), 59–72 (1999)
He, P.: System Non-optimum Analysis and Extension Optimum Theory. In: Chen, G. (ed.) Proc. of the Int’l Conf. on Systems Science and Systems Engineering, pp. 131–137 (2003)
Linstone, H.: Multiple Perspectives for Decision Making, pp. 10–17. North Holland Publishing, New York (1984)
Linstone, H.: Multiple Perspectives: Concepts, Applications, And User Guidelines. Systems Practice 2(2), 307–331 (1989)
Ping, H.: Method of System Non-optimum Analysis in Crisis Management. In: Proc. of Second International Conference of Information System for Crisis Response and Management, pp. 640–645 (2007)
Ping, H.: The Method of Non-optimum Analysis on Risk Management System. In: Van de Walle, B. (ed.) Proc. of the Int’l Conf. ISCRAM 2008, pp. 604–609 (2008)
Ping, H.: Methods of Systems Non-optimum Analysis Based on Intervenient Optimum. In: Wang, Q. (ed.) Proc. of the Int’l Conf. on System Science, Management Science and System Dynamic, pp. 661–670 (2007)
Qu, Z., He, P.: Method of Non-optimum Analysis on Risk Control System. Journal of Software 4(4), 374–381 (2009)
He, P., Qu, Z.: Comparison Computing Based on Sub-optimum Analysis:A Guide System of Network Security. Journal of Networks 4(8), 779–786 (2009)
Qu, Z., He, P.: Intelligence Analysis Based on Intervenient Optimum learning Guide System. In: International Conference on Computational Intelligence and Natural Computing, pp. 336–339. IEEE Computer Society (2009)
He, P., Qu, Z.: Theories and Methods of Sub-optimum Based on Non-optimum Analysis. ICIC Express Letters 4(3), 237–242
He, J., He, P.: A New Intelligence Analysis Method Based on Sub-optimum Learning Model. In: Proc. of the Int’l Conf. International Conference on Future Computer and Communication, pp. 658–661. IEEE Computer Society (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag GmbH Berlin Heidelberg
About this paper
Cite this paper
Duan, L. (2012). Recognition and Evaluation of Information Security Based on Non-optimum Analysis. In: Wu, Y. (eds) Software Engineering and Knowledge Engineering: Theory and Practice. Advances in Intelligent and Soft Computing, vol 115. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25349-2_45
Download citation
DOI: https://doi.org/10.1007/978-3-642-25349-2_45
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25348-5
Online ISBN: 978-3-642-25349-2
eBook Packages: EngineeringEngineering (R0)