透過您的圖書館登入
IP:18.220.13.70

並列摘要


The most commonly used data integrity models today are Bibba, Wilson-Clark and Chinese models. These models are designed for both data integrity protection and confidentiality. Many optimization problems are related to linear programming. In practice, these variables involved are probabilistic. This paper proposes a data integrity model based on data anomalies assuming data are under stochastic linear constraints. An algorithm is constructed using the simplex method to find confidence intervals for the problem solutions. In the end the results from Monte Carlo simulation are compared with those from simplex method.

參考文獻


S. Germano, and D. Yadron, Target faces backlash after 20-day security breach. Wall Street Journal, 1(1), p1-2, 2013.
M. Bishop, Computer security: Art and science. Boston: Addison-Wesley, 2003.
M. Shing, C. Shing, L. Shing, and L. Shing, Analysis of N category privacy models. International Journal of Computer Science and Security, 6(5), p342-358, 2012.
J. Chinneck, Practical optimization. Retrieved on September 14, 2014, from http://www.sce.carleton.ca/faculty/chinneck/po.html, 2006.
M. Shing, C. Shing, L. Shing and L. Shing, An optimization approach in information security risk management. Advances in Management and Applied Economics, 2(1), p1-12, 2012.

被引用紀錄


高資棟(2009)。鳳尾蕨科葉部假脈與矽堆積形式之研究〔碩士論文,國立臺灣大學〕。華藝線上圖書館。https://doi.org/10.6342/NTU.2009.01883

延伸閱讀