题名

Modeling Data Integrity under Stochastic Linear Constraints

DOI

10.7903/ijecs.1247

作者

Lee-Pin Shing;Lee-Hur Shing;Marn-Ling Shing;Chen-Chi Shing

关键词

Data Integrity Model ; Stochastic Linear Programming ; Risk Management Model

期刊名称

International Journal of Electronic Commerce Studies

卷期/出版年月

6卷2期(2015 / 12 / 01)

页次

233 - 242

内容语文

英文

英文摘要

The most commonly used data integrity models today are Bibba, Wilson-Clark and Chinese models. These models are designed for both data integrity protection and confidentiality. Many optimization problems are related to linear programming. In practice, these variables involved are probabilistic. This paper proposes a data integrity model based on data anomalies assuming data are under stochastic linear constraints. An algorithm is constructed using the simplex method to find confidence intervals for the problem solutions. In the end the results from Monte Carlo simulation are compared with those from simplex method.

主题分类 基礎與應用科學 > 資訊科學
社會科學 > 經濟學
社會科學 > 財金及會計學
社會科學 > 管理學
参考文献
  1. Aburdene, M.(1988).Computer simulation of dynamic systems.Iowa:Wm. C. Brown Publishing.
  2. Banks, J.,Carson, J.,Nelson, B.(1996).Discrete event system simulation.New Jersey:Prentice Hall.
  3. Bhat, N.(1972).Elements of applied stochastic processes.New Jersey:John Wiley & Sons.
  4. Bishop, M.(2003).Computer security: Art and science.Boston:Addison-Wesley.
  5. J. Chinneck, Practical optimization. Retrieved on September 14, 2014, from http://www.sce.carleton.ca/faculty/chinneck/po.html, 2006.
  6. Germano, S.,Yadron, D.(2013).Target faces backlash after 20-day security breach.Wall Street Journal,1(1),1-2.
  7. Mendelson, E.(2004).Introducing game theory and its applications.New York:Chapman & Hall.
  8. Shing, M.,Shing, C.,Shing, L.,Shing, L.(2012).An optimization approach in information security risk management.Advances in Management and Applied Economics,2(1),1-12.
  9. Shing, M.,Shing, C.,Shing, L.,Shing, L.(2012).Analysis of N category privacy models.International Journal of Computer Science and Security,6(5),342-358.