Skip to main content
Erschienen in: Information Systems and e-Business Management 2/2020

23.04.2020 | Original Article

Mapping the variations for implementing information security controls to their operational research solutions

verfasst von: Mauricio Diéguez, Jaime Bustos, Carlos Cares

Erschienen in: Information Systems and e-Business Management | Ausgabe 2/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Information Security Management is currently guided by process-based standards. Achieving one or some of these standards means deploying their corresponding set of security controls under different constraints on resources, budgets, information assets to protect, and risks to avoid or mitigate, among other factors. This constitutes a complex combinatorial problem in the decision-making process. To select, schedule and deploy these security controls, qualitative approaches have mainly been proposed. Quantitative approaches to information security management are just emerging, and they have been applied only to simplified theoretical cases. The purpose of this paper is to support the notion that the problems of implementing information security controls, in the sense of being put into effect, can be formulated as a family of existing and already solved optimization problems. The main result is a mapping from a set of seven information security management types of problems to their corresponding operational research formulations. A solved case from a governmental institution illustrates the use of the proposed map.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Allahverdi A, Ng C, Cheng T, Kovalyov M (2008) A survey of scheduling problems with setup times or costs. Eur J Oper Res 187:985–1032CrossRef Allahverdi A, Ng C, Cheng T, Kovalyov M (2008) A survey of scheduling problems with setup times or costs. Eur J Oper Res 187:985–1032CrossRef
Zurück zum Zitat Bistarelli S, Fioravanti F, Peretti P (2007) Using CP-nets as a guide for countermeasure selection. In: Proceedings of the 2007 ACM symposium on applied computing Bistarelli S, Fioravanti F, Peretti P (2007) Using CP-nets as a guide for countermeasure selection. In: Proceedings of the 2007 ACM symposium on applied computing
Zurück zum Zitat Blanco C, Lasheras J, Fernández-Medina E et al (2011) Basis for an integrated security ontology according to a systematic review of existing proposals. Comput Stand Interfaces 33:372–388CrossRef Blanco C, Lasheras J, Fernández-Medina E et al (2011) Basis for an integrated security ontology according to a systematic review of existing proposals. Comput Stand Interfaces 33:372–388CrossRef
Zurück zum Zitat Breier J (2014) Security evaluation model based on the score of security mechanisms. Inf Sci Technol Bull ACM 6:19–27 Breier J (2014) Security evaluation model based on the score of security mechanisms. Inf Sci Technol Bull ACM 6:19–27
Zurück zum Zitat Breier J, Hudec L (2012) New approach in information system security evaluation. In: IEEE First AESS European conference on satellite telecommunications (ESTEL). IEEE, pp 1–6 Breier J, Hudec L (2012) New approach in information system security evaluation. In: IEEE First AESS European conference on satellite telecommunications (ESTEL). IEEE, pp 1–6
Zurück zum Zitat Breier J, Hudec L (2013b) On selecting critical security controls. In: International conference on availability, reliability and security. pp 582–588 Breier J, Hudec L (2013b) On selecting critical security controls. In: International conference on availability, reliability and security. pp 582–588
Zurück zum Zitat Breier J, Hudec L (2013a) On identifying proper security mechanisms. In: Mustofa K, Neuhold EJ, Tjoa AM, Weippl E, You I (eds) Information and communication technology. ICT-EurAsia 2013. Lecture notes in computer science, vol 7804. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36818-9_29 Breier J, Hudec L (2013a) On identifying proper security mechanisms. In: Mustofa K, Neuhold EJ, Tjoa AM, Weippl E, You I (eds) Information and communication technology. ICT-EurAsia 2013. Lecture notes in computer science, vol 7804. Springer, Berlin, Heidelberg. https://​doi.​org/​10.​1007/​978-3-642-36818-9_​29
Zurück zum Zitat Cabot J, Gogolla M (2012) Object constraint language (OCL): a definitive guide. Formal methods for model-driven engineering. Springer, Berlin, pp 58–90CrossRef Cabot J, Gogolla M (2012) Object constraint language (OCL): a definitive guide. Formal methods for model-driven engineering. Springer, Berlin, pp 58–90CrossRef
Zurück zum Zitat Chen J, Askin R (2009) Project selection, scheduling and resource allocation with time dependent returns. Eur J Oper Res 193:23–34CrossRef Chen J, Askin R (2009) Project selection, scheduling and resource allocation with time dependent returns. Eur J Oper Res 193:23–34CrossRef
Zurück zum Zitat Chen L, Li L, Hu Y, Lian K (2009) Information security solution decision-making based on entropy weight and gray situation decision. In: 2009 fifth international conference on information assurance and security. IEEE, pp 7–10 Chen L, Li L, Hu Y, Lian K (2009) Information security solution decision-making based on entropy weight and gray situation decision. In: 2009 fifth international conference on information assurance and security. IEEE, pp 7–10
Zurück zum Zitat Cheng T, Ng C, Yuan J, Liu Z (2005) Single machine scheduling to minimize total weighted tardiness. Eur J Oper Res 165:423–443CrossRef Cheng T, Ng C, Yuan J, Liu Z (2005) Single machine scheduling to minimize total weighted tardiness. Eur J Oper Res 165:423–443CrossRef
Zurück zum Zitat Choo KK, Mubarak S, Mani D et al (2014) Selection of information security controls based on AHP and GRA. In: Proceedings of the 18th Pacific Asia conference on information systems, pp 1–12 Choo KK, Mubarak S, Mani D et al (2014) Selection of information security controls based on AHP and GRA. In: Proceedings of the 18th Pacific Asia conference on information systems, pp 1–12
Zurück zum Zitat Edis E, Oguz C, Ozkarahan I (2013) Parallel machine scheduling with additional resources: notation, classification, models and solution methods. Eur J Oper Res 230:449–463CrossRef Edis E, Oguz C, Ozkarahan I (2013) Parallel machine scheduling with additional resources: notation, classification, models and solution methods. Eur J Oper Res 230:449–463CrossRef
Zurück zum Zitat Egeblad J, Pisinger D (2009) Heuristic approaches for the two and three dimensional knapsack packing problem. Comput Oper Res 36:1026–1049CrossRef Egeblad J, Pisinger D (2009) Heuristic approaches for the two and three dimensional knapsack packing problem. Comput Oper Res 36:1026–1049CrossRef
Zurück zum Zitat Ejnioui A, Otero A, Tejay G, et al (2012) A multi-attribute evaluation of information security controls in organizations using grey systems theory. In: Proceedings of the international conference on security and management (SAM). p 1 Ejnioui A, Otero A, Tejay G, et al (2012) A multi-attribute evaluation of information security controls in organizations using grey systems theory. In: Proceedings of the international conference on security and management (SAM). p 1
Zurück zum Zitat Fenz S, Ekelhart A (2009) Formalizing information security knowledge. In: Proc 4th int symp information, comput commun secur - ASIACCS ’09 Fenz S, Ekelhart A (2009) Formalizing information security knowledge. In: Proc 4th int symp information, comput commun secur - ASIACCS ’09
Zurück zum Zitat Fielder A, Panaousis E, Malacaria P et al (2016) Decision support approaches for cyber security investment. Decis Support Syst 86:13–23CrossRef Fielder A, Panaousis E, Malacaria P et al (2016) Decision support approaches for cyber security investment. Decis Support Syst 86:13–23CrossRef
Zurück zum Zitat Florios K, Mavrotas G, Diakoulaki D (2010) Solving multiobjective, multiconstraint knapsack problems using mathematical programming and evolutionary algorithms. Eur J Oper Res 203:14–21CrossRef Florios K, Mavrotas G, Diakoulaki D (2010) Solving multiobjective, multiconstraint knapsack problems using mathematical programming and evolutionary algorithms. Eur J Oper Res 203:14–21CrossRef
Zurück zum Zitat Gao C, Li Z, Song H (2009) Security evaluation method based on host resource availability. In: Multimedia and ubiquitous engineering, 2009. MUE’09. Third international conference on. pp 499–504 Gao C, Li Z, Song H (2009) Security evaluation method based on host resource availability. In: Multimedia and ubiquitous engineering, 2009. MUE’09. Third international conference on. pp 499–504
Zurück zum Zitat Gass S, Saaty T (1955) Parametric objective function (part 2)-generalization. J Oper Res Soc Am 3:395–401 Gass S, Saaty T (1955) Parametric objective function (part 2)-generalization. J Oper Res Soc Am 3:395–401
Zurück zum Zitat Ghasemi T, Razzazi M (2011) Development of core to solve the multidimensional multiple-choice knapsack problem. Comput Ind Eng 60:349–360CrossRef Ghasemi T, Razzazi M (2011) Development of core to solve the multidimensional multiple-choice knapsack problem. Comput Ind Eng 60:349–360CrossRef
Zurück zum Zitat Gilaninia S, Mousavian S, Taheri O et al (2012) Information security management on performance of information systems management. J Basic Appl Sci Res 2:2582–2588 Gilaninia S, Mousavian S, Taheri O et al (2012) Information security management on performance of information systems management. J Basic Appl Sci Res 2:2582–2588
Zurück zum Zitat Gobierno de Chile (2005) Decreto 83: norma técnica para los órganos de la administración del estado sobre seguridad y confidencialidad de los documentos electrónicos. http://bcn.cl/1uw52. Accessed 14 Apr 2020 Gobierno de Chile (2005) Decreto 83: norma técnica para los órganos de la administración del estado sobre seguridad y confidencialidad de los documentos electrónicos. http://​bcn.​cl/​1uw52. Accessed 14 Apr 2020
Zurück zum Zitat Guizzardi G, Herre H, Wagner G (2002) Towards ontological foundations for UML conceptual models. In: Meersman R, Tari Z (eds) On the move to meaningful internet systems 2002: CoopIS, DOA, and ODBASE. OTM 2002. Lecture notes in computer science, vol 2519. Springer, Berlin, Heidelberg, pp 1100–1117. https://doi.org/10.1007/3-540-36124-3_70 Guizzardi G, Herre H, Wagner G (2002) Towards ontological foundations for UML conceptual models. In: Meersman R, Tari Z (eds) On the move to meaningful internet systems 2002: CoopIS, DOA, and ODBASE. OTM 2002. Lecture notes in computer science, vol 2519. Springer, Berlin, Heidelberg, pp 1100–1117. https://​doi.​org/​10.​1007/​3-540-36124-3_​70
Zurück zum Zitat Hartmann S, Briskorn D (2010) A survey of variants and extensions of the resource-constrained project scheduling problem. Eur J Oper Res 207:1–14CrossRef Hartmann S, Briskorn D (2010) A survey of variants and extensions of the resource-constrained project scheduling problem. Eur J Oper Res 207:1–14CrossRef
Zurück zum Zitat Herroelen W, Leus R (2005) Project scheduling under uncertainty: Survey and research potentials. Eur J Oper Res 165:289–306CrossRef Herroelen W, Leus R (2005) Project scheduling under uncertainty: Survey and research potentials. Eur J Oper Res 165:289–306CrossRef
Zurück zum Zitat Hoogeveen H (2005) Multicriteria scheduling. Eur J Oper Res 167:592–623CrossRef Hoogeveen H (2005) Multicriteria scheduling. Eur J Oper Res 167:592–623CrossRef
Zurück zum Zitat Janak S, Lin X, Floudas C (2007) A new robust optimization approach for scheduling under uncertainty. Comput Chem Eng 31:171–195CrossRef Janak S, Lin X, Floudas C (2007) A new robust optimization approach for scheduling under uncertainty. Comput Chem Eng 31:171–195CrossRef
Zurück zum Zitat Kawasaki R, Hiromatsu T (2014) Proposal of a model supporting decision-making on information security risk treatment. Int J Comput Electr Autom Control Inf Eng 8:583–589 Kawasaki R, Hiromatsu T (2014) Proposal of a model supporting decision-making on information security risk treatment. Int J Comput Electr Autom Control Inf Eng 8:583–589
Zurück zum Zitat Kiesling E, Ekelhart A, Grill B, et al (2013a) Simulation-based optimization of IT security controls: initial experiences with meta-heuristic solution procedures. In: Fink A, Geiger M (eds) Proceedings of the workshop of the EURO working group on metaheuristics, pp 18–20 Kiesling E, Ekelhart A, Grill B, et al (2013a) Simulation-based optimization of IT security controls: initial experiences with meta-heuristic solution procedures. In: Fink A, Geiger M (eds) Proceedings of the workshop of the EURO working group on metaheuristics, pp 18–20
Zurück zum Zitat Kiesling E, Strauss C, Ekelhart A, et al (2013b) Simulation-based optimization of information security controls: an adversary-centric approach. In: Pasupathy R, Kim SH, Tolk A, Hill R, Kuhl ME (eds) Proceedings of the winter simulation conference. IEEE, pp 2054–2065. https://doi.org/10.1109/wsc.2013.6721583 Kiesling E, Strauss C, Ekelhart A, et al (2013b) Simulation-based optimization of information security controls: an adversary-centric approach. In: Pasupathy R, Kim SH, Tolk A, Hill R, Kuhl ME (eds) Proceedings of the winter simulation conference. IEEE, pp 2054–2065. https://​doi.​org/​10.​1109/​wsc.​2013.​6721583
Zurück zum Zitat Kiesling E, Strausss C, Stummer C (2012) A multi-objective decision support framework for simulation-based security control selection. In: Proceedings seventh international conference on availability, reliability and security, pp 454–462. https://doi.org/10.1109/ares.2012.70 Kiesling E, Strausss C, Stummer C (2012) A multi-objective decision support framework for simulation-based security control selection. In: Proceedings seventh international conference on availability, reliability and security, pp 454–462. https://​doi.​org/​10.​1109/​ares.​2012.​70
Zurück zum Zitat Kolisch R, Meyer K (2006) Selection and scheduling of pharmaceutical research projects. Int Ser Oper Res Manag Sci 92:321–344 Kolisch R, Meyer K (2006) Selection and scheduling of pharmaceutical research projects. Int Ser Oper Res Manag Sci 92:321–344
Zurück zum Zitat Kolliopoulos S, Steiner G (2007) Partially ordered knapsack and applications to scheduling. Discret Appl Math 155:889–897CrossRef Kolliopoulos S, Steiner G (2007) Partially ordered knapsack and applications to scheduling. Discret Appl Math 155:889–897CrossRef
Zurück zum Zitat Koulamas C (2010) The single-machine total tardiness scheduling problem: Review and extensions. Eur J Oper Res 202:1–7CrossRef Koulamas C (2010) The single-machine total tardiness scheduling problem: Review and extensions. Eur J Oper Res 202:1–7CrossRef
Zurück zum Zitat Liu F, Lee W (2010) Constructing enterprise information network security risk management mechanism by ontology. Tamkang J Sci Eng 13:79–87 Liu F, Lee W (2010) Constructing enterprise information network security risk management mechanism by ontology. Tamkang J Sci Eng 13:79–87
Zurück zum Zitat Lv J-J, Wang Y-Z (2010) A ranking method for information security risk management based on ahp and promethee. In: Management and service science (MASS), 2010 international conference on. pp 1–4 Lv J-J, Wang Y-Z (2010) A ranking method for information security risk management based on ahp and promethee. In: Management and service science (MASS), 2010 international conference on. pp 1–4
Zurück zum Zitat Masmoudi M, Haït A (2013) Project scheduling under uncertainty using fuzzy modelling and solving techniques. Eng Appl Artif Intell 26:135–149CrossRef Masmoudi M, Haït A (2013) Project scheduling under uncertainty using fuzzy modelling and solving techniques. Eng Appl Artif Intell 26:135–149CrossRef
Zurück zum Zitat Mouratidis H (2007) Secure information systems engineering: a manifesto. Int J Electron Secur Digit Forensics 1:27–41CrossRef Mouratidis H (2007) Secure information systems engineering: a manifesto. Int J Electron Secur Digit Forensics 1:27–41CrossRef
Zurück zum Zitat Nagata K, Amagasa M, Kigawa Y, Cui D (2009) Method to select effective risk mitigation controls using fuzzy outranking. In: 2009 ninth international conference on intelligent systems design and applications Nagata K, Amagasa M, Kigawa Y, Cui D (2009) Method to select effective risk mitigation controls using fuzzy outranking. In: 2009 ninth international conference on intelligent systems design and applications
Zurück zum Zitat Ojamaa A, Tyugu E, Kivimaa J (2008) Pareto-optimal situaton analysis for selection of security measures. In: MILCOM 2008—2008 IEEE military communications conference. IEEE Ojamaa A, Tyugu E, Kivimaa J (2008) Pareto-optimal situaton analysis for selection of security measures. In: MILCOM 2008—2008 IEEE military communications conference. IEEE
Zurück zum Zitat Otero A, Ejnioui A, Otero C, Tejay G (2011) Evaluation of information security controls in organizations by grey relational analysis. Int J Dependable Trust Inf Syst 2:36–54CrossRef Otero A, Ejnioui A, Otero C, Tejay G (2011) Evaluation of information security controls in organizations by grey relational analysis. Int J Dependable Trust Inf Syst 2:36–54CrossRef
Zurück zum Zitat Otero A, Tejay G, Otero D, Ruiz-Torres A (2012) A fuzzy logic-based information security control assessment for organizations. In: Open systems (ICOS), 2012 IEEE conference, pp 1–6 Otero A, Tejay G, Otero D, Ruiz-Torres A (2012) A fuzzy logic-based information security control assessment for organizations. In: Open systems (ICOS), 2012 IEEE conference, pp 1–6
Zurück zum Zitat Parkin S, van Moorsel A, Coles R (2009) An information security ontology incorporating human-behavioural implications. In: Proceedings of the 2nd international conference on Security of information and networks, pp 46–55 Parkin S, van Moorsel A, Coles R (2009) An information security ontology incorporating human-behavioural implications. In: Proceedings of the 2nd international conference on Security of information and networks, pp 46–55
Zurück zum Zitat Pereira T, Santos H (2014) Challenges in information security protection. In: Proceedings 13th European conference on cyber warfare and security, pp 160–166 Pereira T, Santos H (2014) Challenges in information security protection. In: Proceedings 13th European conference on cyber warfare and security, pp 160–166
Zurück zum Zitat Saleh M (2011) Information security maturity model. Int J Comput Sci Secur 5:316–337 Saleh M (2011) Information security maturity model. Int J Comput Sci Secur 5:316–337
Zurück zum Zitat Samphaiboon N, Yamada T (2002) Heuristic and exact algorithms for the precedence-constrained knapsack problem. J Optim Theory Appl 105:659–676CrossRef Samphaiboon N, Yamada T (2002) Heuristic and exact algorithms for the precedence-constrained knapsack problem. J Optim Theory Appl 105:659–676CrossRef
Zurück zum Zitat Sánchez L, Villafranca D, Fernandez-Medina E, Piattini M (2009) MGSM-PYME: Metodología para la gestión de la seguridad y su madurez en las PYMES. In: Proceedings V Congreso Iberoamericano de Seguridad Informática, pp 452–466 Sánchez L, Villafranca D, Fernandez-Medina E, Piattini M (2009) MGSM-PYME: Metodología para la gestión de la seguridad y su madurez en las PYMES. In: Proceedings V Congreso Iberoamericano de Seguridad Informática, pp 452–466
Zurück zum Zitat Sarala R, Zayaraz G, Vijayalakshmi V (2015) Optimal selection of security countermeasures for effective information security. In: Proceedings of the international conference on soft computing systems. Springer, pp 345–353 Sarala R, Zayaraz G, Vijayalakshmi V (2015) Optimal selection of security countermeasures for effective information security. In: Proceedings of the international conference on soft computing systems. Springer, pp 345–353
Zurück zum Zitat Staab S, Studer R (2009) Handbook on ontologies, Springer Sci Bus Media Staab S, Studer R (2009) Handbook on ontologies, Springer Sci Bus Media
Zurück zum Zitat Susanto H, Almunawar M, Tuan Y (2012) Information security challenge and breaches: novelty approach on measuring ISO 27001 readiness level. Int J Eng Technol 2:67–75 Susanto H, Almunawar M, Tuan Y (2012) Information security challenge and breaches: novelty approach on measuring ISO 27001 readiness level. Int J Eng Technol 2:67–75
Zurück zum Zitat Susanto H, Almunawar MN, Tuan YC (2011) Information security management system standards: a comparative study of the big five. Int J Electr Comput Sci IJECSIJENS 11:23–29 Susanto H, Almunawar MN, Tuan YC (2011) Information security management system standards: a comparative study of the big five. Int J Electr Comput Sci IJECSIJENS 11:23–29
Zurück zum Zitat Tasan S, Gen M (2013) An integrated selection and scheduling for disjunctive network problems. Comput Ind Eng 65:6–76 Tasan S, Gen M (2013) An integrated selection and scheduling for disjunctive network problems. Comput Ind Eng 65:6–76
Zurück zum Zitat Tofan D (2011) Information security standards. J Mobile Embed Distrib Syst 3:128–135 Tofan D (2011) Information security standards. J Mobile Embed Distrib Syst 3:128–135
Zurück zum Zitat Wang L, Wang S, Xu Y (2012) An effective hybrid EDA-based algorithm for solving multidimensional knapsack problem. Expert Syst Appl 39:5593–5599CrossRef Wang L, Wang S, Xu Y (2012) An effective hybrid EDA-based algorithm for solving multidimensional knapsack problem. Expert Syst Appl 39:5593–5599CrossRef
Zurück zum Zitat Wäscher G, Haubner H, Schumann H (2007) An improved typology of cutting and packing problems. Eur J Oper Res 183:1109–1130CrossRef Wäscher G, Haubner H, Schumann H (2007) An improved typology of cutting and packing problems. Eur J Oper Res 183:1109–1130CrossRef
Zurück zum Zitat Weglarz J, Józefowska J, Mika M, Waligóra G (2011) Project scheduling with finite or infinite number of activity processing modes—a survey. Eur J Oper Res 208:177–205CrossRef Weglarz J, Józefowska J, Mika M, Waligóra G (2011) Project scheduling with finite or infinite number of activity processing modes—a survey. Eur J Oper Res 208:177–205CrossRef
Zurück zum Zitat Wierzbicki AP (1980) The use of reference objectives in multiobjective optimization. In: Fandel G, Gal T (eds) Multiple criteria decision making theory and application. Lecture notes in economics and mathematical systems, vol 177. Springer, Berlin, Heidelberg, pp 468–486. https://doi.org/10.1007/978-3-642-48782-8_32 Wierzbicki AP (1980) The use of reference objectives in multiobjective optimization. In: Fandel G, Gal T (eds) Multiple criteria decision making theory and application. Lecture notes in economics and mathematical systems, vol 177. Springer, Berlin, Heidelberg, pp 468–486. https://​doi.​org/​10.​1007/​978-3-642-48782-8_​32
Zurück zum Zitat Yameng C, Yulong S, Jianfeng M, et al (2011) AHP-GRAP based security evaluation method for MILS System within CC framework. In: Proceedings seventh international conference on computational intelligence and security, pp 635–639. https://doi.org/10.1109/cis.2011.145 Yameng C, Yulong S, Jianfeng M, et al (2011) AHP-GRAP based security evaluation method for MILS System within CC framework. In: Proceedings seventh international conference on computational intelligence and security, pp 635–639. https://​doi.​org/​10.​1109/​cis.​2011.​145
Zurück zum Zitat Yang Y, Shieh H, Leu J, Tzeng G (2009) A VIKOR-based multiple criteria decision method for improving information security risk. Int J Inf Technol Decis Mak 8:267–287CrossRef Yang Y, Shieh H, Leu J, Tzeng G (2009) A VIKOR-based multiple criteria decision method for improving information security risk. Int J Inf Technol Decis Mak 8:267–287CrossRef
Zurück zum Zitat Yang Y, Shieh H, Tzeng G (2013) A VIKOR technique based on DEMATEL and ANP for information security risk control assessment. Inf Sci (Ny) 232:482–500CrossRef Yang Y, Shieh H, Tzeng G (2013) A VIKOR technique based on DEMATEL and ANP for information security risk control assessment. Inf Sci (Ny) 232:482–500CrossRef
Zurück zum Zitat You B, Yamada T (2007) ). A pegging approach to the precedence-constrained knapsack problem. Eur J Oper Res 183:618–632CrossRef You B, Yamada T (2007) ). A pegging approach to the precedence-constrained knapsack problem. Eur J Oper Res 183:618–632CrossRef
Metadaten
Titel
Mapping the variations for implementing information security controls to their operational research solutions
verfasst von
Mauricio Diéguez
Jaime Bustos
Carlos Cares
Publikationsdatum
23.04.2020
Verlag
Springer Berlin Heidelberg
Erschienen in
Information Systems and e-Business Management / Ausgabe 2/2020
Print ISSN: 1617-9846
Elektronische ISSN: 1617-9854
DOI
https://doi.org/10.1007/s10257-020-00470-8

Weitere Artikel der Ausgabe 2/2020

Information Systems and e-Business Management 2/2020 Zur Ausgabe