An integrated framework of security tool selection using fuzzy regression and physical programming |
Nguyen, Hoai-Vu
(베트남 FPT대, Computer기초학과)
Kongsuwan, Pauline (인제대학교 정보통신시스템학과) Shin, Sang-Mun (인제대학교 시스템경영공학과) Choi, Yong-Sun (인제대학교 시스템경영공학과) Kim, Sang-Kyun (강원대학교 산업공학과) |
1 | R. Hefner, and W. Monroe, "System Security Engineering Capability Maturity Model," Proceeding of Conference on Software Process Improvement, UC Irvine, USA, 1997. |
2 | M. Eloff, and S.H. Solms, "Information Security Management, Hierarchical Framework for Various Approaches," Computers & Security, Vol. 19, No. 3, pp. 243–256, March 2000. DOI ScienceOn |
3 | W.T. Polk, "Guide to the Selection of Anti-Virus Tools & Techniques", Diane Books Publishing Company, 1992. |
4 | R. Firth, B. Fraser, S. Konda, and D. Simmel, "An Approach for Selecting and Specifying Tools for Information Survivability", Carnegie Mellon University, July 1998. |
5 | ISO/IEC 9126-1:2001, http:/ /www.iso.org/ iso/ iso_catalogue/ catalogue _tc/catalogue_detail.htm?csnumber=22749 |
6 | C.S. Leem, and S. Kim, "Introduction to an Integrated Methodology for Development and Implementation of Enterprise Information Systems," Journal of Systems and Software, Vol. 60, No. 3, pp. 249–261, February 2002. DOI ScienceOn |
7 | H.V. Nguyen, S. Shin, and Y. Choi, "An integrated approach to the optimal selection of security tools using analytic hierarchy process and goal programming," International Journal of Technology Management, accepted for publication, 2009. |
8 | T. Tsiakis, and G. Stephanides, "The Economic Approach of Information Security," Computers & Security, Vol. 24, No. 2, pp. 105-108, March 2005. DOI ScienceOn |
9 | ISO/IEC 15408-1:2005, http://www.iso.org/ iso/ catalogue_detail.htm?cs number=40612. |
10 | M. Choi, and S. Shin, "Optimizing Quality Levels and Development Costs for Developing an Integrated Information Security System," Information Security Applications, edited by C. H. Lim and M. Yung, Vol. 4867, Lecture Notes in Computer Science, Springer, 2008, pp. 359-370. |
11 | S. Kim, and H.J. Lee, "A Study on Decision Consolidation Methods Using Analytic Models for Security Systems," Computers & Security, Vol. 26, No. 2, pp. 145–153, March 2007. DOI ScienceOn |
12 | P. Kongsuwan, S. Shin, and M. Choi, "Managing Quality Level for Developing Information Security System Adopting QFD," Proceeding of 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, Phuket, Thailand, 2008, pp. 19-24. |
13 | M. Monheit, and A. Tsafrir, "Information Systems Architecture: a Consulting Methodology," Proceeding of the 1990 IEEE International Conference on Computer Systems and Software Engineering, Tel Aviv, Israel, 1990, pp. 568-572. |
14 | E. Eetugrul Karsak, and C. Okan Ozogul, "An Integrated Decision Making Approach for ERP System Selection," Expert Systems with Applications, Vol. 36, No. 1, pp. 660-667, January 2009. DOI ScienceOn |
15 | H.Y. Lin, P.Y. Hsu, and G.J. Sheen, "A Fuzzy-Based Decision-Making Procedure for Data Warehouse System Selection," Expert Systems with Applications, Vol. 32, No. 3, pp. 939-953, April 2007. DOI ScienceOn |
16 | M.J. Schniederjans, and R.L. Wilson, "Using the Analytic Hierarchy Process and Goal Programming for Information System Project Selection," Information and Management, Vol. 20, No. 5, pp. 333–342, May 1991. DOI ScienceOn |
17 | E.E. Anderson, and J. Choobineh, "Enterprise Information Security Strategies," Computers & Security, Vol. 27, No.1-2, pp. 22-29, March 2008. DOI ScienceOn |
18 | M.J. Schniederjans, "Linear Goal Programming", Petrocelli Books, 1984. |
19 | E. Melachrinoudis, A. Messac A, H. Min, "Consolidating a Warehouse Network: a Physical Programming Approach," International Journal of Production Economics, Vol. 97, No. 1, pp. 1-17, July 2005. DOI ScienceOn |
20 | M. Patel, K.E. Lewis, A. Maria, and A. Messac, "System Design through Subsystem Selection Using Physical Programming," AIAA Journal, Vol. 41, No. 6, pp. 1089-1096, June 2003. DOI ScienceOn |
21 | A. Messac, S.M. Gupta, and B. Akbulut, "Linear Physical Programming: a New Approach to Multiple Objective Optimization," Transactions on Operational Research, Vol. 8, No. 1, pp. 39-59, October 1996. |
22 | T.L. Saaty, "A Scaling Method for Priorities in Hierarchical Structures," Journal of Mathematical Psychology, Vol. 15, No. 3, pp. 234–281, June 1977. DOI |
23 | S. Chakraborty, and S. Dey, "QFD-Based Expert System for Non-Traditional Machining Processes Selection," Expert Systems with Applications, Vol. 32, No. 4, pp. 1208-1217, May 2007. DOI ScienceOn |
24 | L. Chan, and M. Wu, "Quality Function Deployment: a Literature Review," European Journal of Operational Research, Vol. 143, No. 3, pp. 463-497, December 2002. DOI ScienceOn |
25 | H. Tanaka, S. Uejima, and K. Asai, "Linear Regression Analysis with Fuzzy Model," IEEE Transactions on Systems, Man, and Cybernetics, Vol. 12, No. 6, pp. 903–907, November 1982. DOI ScienceOn |
26 | H. Tanaka, and J. Watada, "Possibilistic Linear Systems and Their Application to the Linear Regression Model," Fuzzy Sets and Systems, Vol. 27, No. 3, pp. 275–289, September 1988. DOI ScienceOn |
27 | W. Chen, A. Sahai, A. Messac, and G.J. Sundararaj, "Exploration of the Effectiveness of Physical Programming in Robust Design," ASME Journal of Mechanical Design, Vol. 122, No. 2, pp.155-163, June 2000. DOI ScienceOn |
28 | E. Kongar, and S.M. Gupta, "Disassembly-to-Order System Using Linear Physical Programming," Proceeding of IEEE International Symposium in Electronics and the Environment, San Francisco CA, USA, 2002, pp. 312-317. |
29 | EC advisory group SOG-IS, "Information Technology Security Evaluation Criteria (ITSEC)," Version 1.2, the Department of Trade and Industry, London, June 1991. |
30 | Department of Defense Standard, "Department of Defense Trusted Computer System Evaluation Criteria," DoD 5200.28-STD, December, 1985. |