Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Research on Fuzzy Group Decision Making in Security Risk Assessment

  • Conference paper
Networking - ICN 2005 (ICN 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3421))

Included in the following conference series:

Abstract

Decision making problems in security risk assessment are often associated with multiple criteria and multiple decision makers. In the proposed approach, decision making by multiple decision makers has been considered under uncertain conditions. An optimization model is used to assess criteria weights and then to rank risks. The different preference information from different decision makers are firstly transformed into uniform fuzzy preference relations and aggregated. Then ranking or selection of the alternatives reflects the decision makers’ subjective preference based on the objective decision information. It has been found that using fuzzy set theory to represent uncertainties under multiple-participant multi-criteria environment is very promising. The practices indicate that fuzzy group decision making techniques provide concepts and theoretical results that are valuable in formulating and solving problems in security risk assessment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Carroll, J.M.: Computer Security. Butterworth-Heinemann (1996)

    Google Scholar 

  2. Cushing, K.: IT Directors Must Review Security Every 90 Days. Computer Weekly: 4 (2002)

    Google Scholar 

  3. Information Security Risk Assessment, United States General Accounting office GAO/AIMD-00-33 (November 1999)

    Google Scholar 

  4. Liu, F., Dai, K., Wang, Z.: Improving Security Architecture Development Based on Multiple Criteria Decision Making. In: Chi, C.-H., Lam, K.-Y. (eds.) AWCC 2004. LNCS, vol. 3309, pp. 214–218. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  5. Butler, S.A.: Security Attribute Evaluation Method. Carnegie Mellon University, Dissertation of Doctor of Philosophy (May 2003)

    Google Scholar 

  6. Chiclana, F., Herrera, F., Herrera-Viedma, E.: Integrating Three Representation Models in Fuzzy Multipurpose Decision Making Based on Fuzzy Preference Relations. Fuzzy Sets and Systems 97, 33–48 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  7. Ma, J., Zhang, Q., Fan, Z., Liang, J., et al.: An Approach to Multiple Attribute Decision Making based on Preference Information on Alternatives. In: HICSS (2001)

    Google Scholar 

  8. Feng, S., Xu, L.D.: Decision Support for Fuzzy Comprehensive Evaluation of Urban Development. Fuzzy Sets and Systems 105(1), 1–12 (1999)

    Article  Google Scholar 

  9. Cheng, C.H., Yang, K.L.: Evaluating Attack Helicopters by AHP Based on Linguistic Variable Weight. European Journal of Operational Research 116, 423–435 (1999)

    Article  MATH  Google Scholar 

  10. Leekwijck, W.V., Kerre, E.E.: Defuzzification: Criteria and Classification. Fuzzy Sets and Systems 108(2), 159–178 (1999)

    Article  MATH  MathSciNet  Google Scholar 

  11. Chen, S.-J., Hwang, C.-L.: Fuzzy Multiple Attribute Decision Making: Methods and Applications. Springer, New York (1992)

    MATH  Google Scholar 

  12. Zhou, D.N.: Fuzzy Group Decision Support System Approach to Group Decision Making Under Multiple Criteria. Dissertation of Doctor of Philosophy, City University of Hong Kong (March 2000)

    Google Scholar 

  13. Ma, J., Fan, Z., Wei, Q.: Existence and construction of weight-set for satisfying preference orders of alternatives based on additive multi-attribute value model. IEEE Transactions on Systems, Man, and Cybernetics, Part A 31(1), 66–72 (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, F., Dai, K., Wang, Z., Ma, J. (2005). Research on Fuzzy Group Decision Making in Security Risk Assessment. In: Lorenz, P., Dini, P. (eds) Networking - ICN 2005. ICN 2005. Lecture Notes in Computer Science, vol 3421. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31957-3_127

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-31957-3_127

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25338-9

  • Online ISBN: 978-3-540-31957-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics