Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Qi Yong is active.

Publication


Featured researches published by Qi Yong.


international conference on risk management & engineering management | 2008

Information Security Risk Assessment Based on Analytic Hierarchy Process and Fuzzy Comprehensive

Xiao Long; Qi Yong; Li Qianmu

Starting with the theory and research status on the information security risk assessment, this paper puts forward information security risk evaluation method based on analytic hierarchy process and fuzzy comprehensive evaluation, and solves the difficulty of the qualitative index and quantitative evaluation in the risk assessment process. Finally, it gives examples to prove that this method can be well applied to information security risk assessment.


computer science and software engineering | 2008

Information Security Risk Assessment Method Based on CORAS Frame

Qi Yong; Xiao Long; Li Qianmu

This paper first carry out the summary to the information security risk assessments present situation and the correlation criterion, then introduced in detail to the risk which possibly exists carry out the quantification based on the CORAS frames information security risk assessment method and using the analytic hierarchy process, finally uses on-line Electronic bank systems example, proved this method to be possible very well suitable in the information security risk assessment.This paper first carry out the summary to the information security risk assessments present situation and the correlation criterion, then introduced in detail to the risk which possibly exists carry out the quantification based on the CORAS frames information security risk assessment method and using the analytic hierarchy process, finally uses on-line Electronic bank systems example, proved this method to be possible very well suitable in the information security risk assessment.


international conference on intelligent computing | 2011

A Service Access Security Control Model in Cyberspace

Li Qianmu; Hou Jun; Xu Jian; Zhang Hong; Qi Yong

A service access control model in cyberspace is proposed, which provides a generalized and effective mechanism of security management with some items constraint specifications. These constraint specifications are organized to form a construction, and an enact process is proposed to make it scalable and flexible to meet the need of diversified service application systems in cyberspace. The model of this paper erases the downward information flow by extended rules of read/write, which is the breakthrough of the limitations when applying the standard role-based access control in cyberspace.


Archive | 2013

Intelligent access system for public security

Li Qianmu; Qi Yong; Mao Haiyan


Archive | 2012

Oriented distributed coal mine gas monitoring system

Li Qianmu; Ni Chenchen; Qi Yong


Archive | 2014

Method for generating cubic grid data through triangle surface metadata in parabolic equation

Huang Hanqing; Feng Feng; Qi Yong; Li Qianmu; Yuan Hongbing


Archive | 2013

Intelligent agricultural base monitoring system facing secure sensing network

Li Qianmu; Qi Yong; Wang Huan; Hou Jun


Archive | 2013

Network security attack defense method using state attack and defense graph model

Li Qianmu; Liu Gang; Shen Minglei; Yao Xiaolian; Qi Yong; Hou Jun


Archive | 2013

Security intelligent checkpoint system

Li Qianmu; Qi Yong; Mao Haiyan


Archive | 2014

Network laboratory attendance system

Li Qianmu; Zhang Shengxiao; Hou Jun; Qi Yong; Yang Wen; Li Zongxing

Collaboration


Dive into the Qi Yong's collaboration.

Top Co-Authors

Avatar

Li Qianmu

Nanjing University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Hou Jun

Nanjing University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Zhang Hong

Nanjing University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Mao Haiyan

Nanjing University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Wang Xin

North China Electric Power University

View shared research outputs
Top Co-Authors

Avatar

Xu Jian

Nanjing University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Yu Xiaocong

China National Petroleum Corporation

View shared research outputs
Top Co-Authors

Avatar

Tang Zhenmin

Nanjing University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge