Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Software security assessment method of complex software system based on supply chain

A software system and supply chain technology, applied in software indicators, software maintenance/management, data processing applications, etc., can solve the problems of ambiguity in evaluation results, unreliable elimination, and no evaluation given.

Inactive Publication Date: 2019-01-11
BEIJING JIAOTONG UNIV
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] 2. In the process of evaluating software elements, experts usually evaluate them in natural language, and the evaluation results are somewhat ambiguous. How to properly evaluate and characterize software elements is a challenge;
[0012] 3. For the evaluations of multiple experts, there may be inconsistencies between the evaluations, how to properly handle the contradictions between the evaluations, and eliminate unreliable evaluations without giving an appropriate plan

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software security assessment method of complex software system based on supply chain
  • Software security assessment method of complex software system based on supply chain
  • Software security assessment method of complex software system based on supply chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049]Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0050] Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the description of the present invention refers to the presence of said features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations, elements, components, and / or groups thereof. It will be understood...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a software security evaluation method of a complex software system based on a supply chain. The method comprises the following steps of: acquiring a plurality of security elements affecting the security of a complex software system; obtaining scores for each security element based on historical expert experience data and / or observation data; mapping the rating of each security factor to the basic belief assignment (BBA) data in the D-S evidence theory by a belief conversion function, and fusing the BBA of all the security factors at the decision level to obtain the global BBA result data of the complex software system, and judging the security of the complex software system according to the global BBA result data. The method can accurately and flexibly evaluate the security of the complex software system, eliminate the unreliable security evaluation, and clearly embody the evaluation of the security of the software system.

Description

technical field [0001] The invention relates to the field of software system security assessment, in particular to a software security assessment method for complex software systems based on supply chains. Background technique [0002] Cyberspace has become the fifth space of national sovereignty after land, sea, air, and space, and its security faces huge challenges. With the continuous development of information technology, as an important element in cyberspace, the complexity of software systems is increasing, and its security assessment is becoming more and more complicated. [0003] Currently, supply chain-based software security assessment schemes have been extensively studied. The procedures for auditing supply chain management mainly include: [0004] First, check the articles of association, documents, etc. of the enterprise to confirm whether the enterprise has formulated supply chain management policies, whether it has established management procedures and other...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F8/77G06Q10/06
CPCG06F8/77G06Q10/06393
Inventor 张振江沈波赵颖斯朱凯歌徐瑞赵雪聪史颜丞王堃
Owner BEIJING JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products