Font Size:
The Method of the Information Security Risk Assessment in Cloud Computing Systems
Last modified: 2021-02-27
Abstract
In this article the possibility of numerical assessment of information security risks in cloud computing system is considered. The fuzzy cognitive maps and artificial neural network are used to solve this problem.
Keywords
neural network; cognitive maps; information security
References
1. N.Antonopoulos, L. Gillam Cloud Computing: Principles, Systems and Applications. - L.: Springer, 2010. - 379p. - (Computer Communications and Networks).
2. M. Guzairov, I. Mashkina, E. Stepanova The treats model development by fuzzy cognitive maps formation on the bases of security policy. - Information technology security №2, 2011. P. 37-49.
2. M. Guzairov, I. Mashkina, E. Stepanova The treats model development by fuzzy cognitive maps formation on the bases of security policy. - Information technology security №2, 2011. P. 37-49.
Full Text:
PDF