• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Sha Letian, Fu Jianming, Chen Jing, and Huang Shiyong. A Sensitivity Measurement for Sensitive Information Processing[J]. Journal of Computer Research and Development, 2014, 51(5): 1050-1060.
Citation: Sha Letian, Fu Jianming, Chen Jing, and Huang Shiyong. A Sensitivity Measurement for Sensitive Information Processing[J]. Journal of Computer Research and Development, 2014, 51(5): 1050-1060.

A Sensitivity Measurement for Sensitive Information Processing

More Information
  • Published Date: May 14, 2014
  • Application software needs to use sensitive information to build up the authentication between client and server, so how to measure the security or sensitivity of sensitive information during processing is an open issue. According to the procedure of sensitive information processing and context of its occurrence, inherent property, variable property and inferenced property have been defined, the mapping rules from these properties to data operations have been designed, and a method of sensitivity calculation based on AHP (analytic hierarchy process) and TOPSIS (technique for order preference by similarity to an ideal solution) has been proposed. This method can demonstrate dynamic changes of sensitivities among sensitive information processing to support security prevention against information leakage and attacks, and can be applied to security analysis and trust measure of trustworthy software on sensitive information. Finally, experimental results demonstrate that this method can describe sensitivity changes among sensitive information processing, and discover the potentially dangerous points in this processing, so its effectivity has been verified.
  • Related Articles

    [1]Shen Guohua, Zhang Wei, Huang Zhiqiu, Zhang Yulong, Jin Lantao, He Wenmin, Jia Zhe, Zhao Ziyue. Description-Logic-Based Feature Modeling and Verification[J]. Journal of Computer Research and Development, 2013, 50(7): 1501-1512.
    [2]Jia Cunxin, Hu Wei, Bai Wenyang, and Qu Yuzhong. SMap: Semantically Mapping Relational Database Schemas to OWL Ontologies[J]. Journal of Computer Research and Development, 2012, 49(10): 2241-2250.
    [3]Zhou Liping, Huang Houkuan, Qi Guilin, Qu Youli, Ji Qiu. An Algorithm for Calculating Minimal Unsatisfiability-Preserving Subsets of Ontology in DL-Lite[J]. Journal of Computer Research and Development, 2011, 48(12): 2334-2342.
    [4]Wang Zhuxiao, Hu Hong, Chen Limin, Shi Zhongzhi. Parallel Computation Techniques for Dynamic Description Logics Reasoning[J]. Journal of Computer Research and Development, 2011, 48(12): 2317-2325.
    [5]Wan Changlin, Shi Zhongzhi, Hu Hong, Zhang Dapeng. QoS-Aware Semantic Web Service Modeling and Discovery[J]. Journal of Computer Research and Development, 2011, 48(6): 1059-1066.
    [6]Liu Sipei, Liu Dayou, Qi Hong, and Guan Jinghua. Composing Semantic Web Service with Description Logic Rules[J]. Journal of Computer Research and Development, 2011, 48(5): 831-840.
    [7]Jiang Yuncheng, Tang Suqin, Wang Ju, Zhou Shengming. Computing Most Specific Concept in Description Logic with Transitive Roles and Existential Restrictions[J]. Journal of Computer Research and Development, 2009, 46(6): 979-987.
    [8]Jiang Yuncheng, Wang Ju, Zhou Shengming, Tang Yong. Hybrid Reasoning of Terminological Cycles in Description Logic εL[J]. Journal of Computer Research and Development, 2009, 46(1): 15-22.
    [9]Jiang Yuncheng, Tang Yong, Wang Ju, Shen Yuming. A Tableaux Decision Procedure for Fuzzy Description Logic FALNUI[J]. Journal of Computer Research and Development, 2007, 44(8): 1309-1316.
    [10]Jiang Yuncheng, Shi Zhongzhi, Tang Yong, Wang Ju. A Distributed Dynamic Description Logic[J]. Journal of Computer Research and Development, 2006, 43(9): 1603-1608.

Catalog

    Article views (786) PDF downloads (618) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return