National Technical Reports Library - NTRL

National Technical Reports Library


Details
Actions:
Download PDFDownload XML
Download

Use of Multi-attribute Utility Functions in Evaluating Security Systems.


DE2009945554

Publication Date 2008
Personal Author Meyers, C.; Lamont, A.; Sicherman, A.
Page Count 18
Abstract In analyzing security systems, we are concerned with protecting a building or facility from an attack by an adversary. Typically, we address the possibility that an adversary could enter a building and cause damage resulting in an immediate loss of life, or at least substantial disruption in the operations of the facility. In response to this setting, we implement security systems including devices, procedures, and facility upgrades designed to (a) prevent the adversary from entering, (b) detect and neutralize him if he does enter, and (c) harden the facility to minimize damage if an attack is carried out successfully. Although we have cast this in terms of physical protection of a building, the same general approach can be applied to non-physical attacks such as cyber attacks on a computer system. A rigorous analytic process is valuable for quantitatively evaluating an existing system, identifying its weaknesses, and proposing useful upgrades. As such, in this paper we describe an approach to assess the degree of overall protection provided by security measures.
Keywords
  • Security systems
  • Physical protection
  • Computer security
  • Function calibration
  • Interactions
  • Strength determinations
  • Data processing security
  • Normalization
  • Multiattribute utility functions
  • Compensatory case
  • Additive case
  • Complementary case
Source Agency
  • Technical Information Center Oak Ridge Tennessee
Corporate Authors Lawrence Livermore National Lab., CA.
Document Type Technical Report
NTIS Issue Number 200912
Use of Multi-attribute Utility Functions in Evaluating Security Systems.
Use of Multi-attribute Utility Functions in Evaluating Security Systems.
DE2009945554

  • Security systems
  • Physical protection
  • Computer security
  • Function calibration
  • Interactions
  • Strength determinations
  • Data processing security
  • Normalization
  • Multiattribute utility functions
  • Compensatory case
  • Additive case
  • Complementary case
  • Technical Information Center Oak Ridge Tennessee
Loading