Qi Yong
Nanjing University of Science and Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Qi Yong.
international conference on risk management & engineering management | 2008
Xiao Long; Qi Yong; Li Qianmu
Starting with the theory and research status on the information security risk assessment, this paper puts forward information security risk evaluation method based on analytic hierarchy process and fuzzy comprehensive evaluation, and solves the difficulty of the qualitative index and quantitative evaluation in the risk assessment process. Finally, it gives examples to prove that this method can be well applied to information security risk assessment.
computer science and software engineering | 2008
Qi Yong; Xiao Long; Li Qianmu
This paper first carry out the summary to the information security risk assessments present situation and the correlation criterion, then introduced in detail to the risk which possibly exists carry out the quantification based on the CORAS frames information security risk assessment method and using the analytic hierarchy process, finally uses on-line Electronic bank systems example, proved this method to be possible very well suitable in the information security risk assessment.This paper first carry out the summary to the information security risk assessments present situation and the correlation criterion, then introduced in detail to the risk which possibly exists carry out the quantification based on the CORAS frames information security risk assessment method and using the analytic hierarchy process, finally uses on-line Electronic bank systems example, proved this method to be possible very well suitable in the information security risk assessment.
international conference on intelligent computing | 2011
Li Qianmu; Hou Jun; Xu Jian; Zhang Hong; Qi Yong
A service access control model in cyberspace is proposed, which provides a generalized and effective mechanism of security management with some items constraint specifications. These constraint specifications are organized to form a construction, and an enact process is proposed to make it scalable and flexible to meet the need of diversified service application systems in cyberspace. The model of this paper erases the downward information flow by extended rules of read/write, which is the breakthrough of the limitations when applying the standard role-based access control in cyberspace.
Archive | 2013
Li Qianmu; Qi Yong; Mao Haiyan
Archive | 2012
Li Qianmu; Ni Chenchen; Qi Yong
Archive | 2014
Huang Hanqing; Feng Feng; Qi Yong; Li Qianmu; Yuan Hongbing
Archive | 2013
Li Qianmu; Qi Yong; Wang Huan; Hou Jun
Archive | 2013
Li Qianmu; Liu Gang; Shen Minglei; Yao Xiaolian; Qi Yong; Hou Jun
Archive | 2013
Li Qianmu; Qi Yong; Mao Haiyan
Archive | 2014
Li Qianmu; Zhang Shengxiao; Hou Jun; Qi Yong; Yang Wen; Li Zongxing