Graded Security Expert System

  • Jüri Kivimaa
  • Andres Ojamaa
  • Enn Tyugu
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5508)


A method for modeling graded security is presented and its application in the form of a hybrid expert system is described. The expert system enables a user to select security measures in a rational way based on the Pareto optimality computation using the dynamic programming for finding points of Pareto optimality curve. The expert system provides a rapid and fair security solution for a class of known information systems at a high comfort level.


Expert System Security Requirement Security Level Security Measure Security Solution 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Kang, Y., Jeong, C. H., Kim, D. I.: Regulatory approach on digital security of instrumentation, control and information systems in nuclear power plants. Korea Institute of Nuclear Safety. Daejeon, Korea, (August 31, 2008)
  2. 2.
    German Federal Office for Information Security (BSI): IT Baseline Protection Manual (2005), (August 31, 2008)
  3. 3.
    Estonian Information Systems Three-Level Security Baseline System – ISKE ver. 1.0Google Scholar
  4. 4.
    U. S. Department of Energy, Office of Security Affairs: Classified Information Systems Security Manual (1999)Google Scholar
  5. 5.
    U. S. Department of Defense: National Industrial Security Program Operating Manual (NISPOM) (2006)Google Scholar
  6. 6.
    U. S. Department of Defense, Defense Information Systems Agency. CyberProtect, version 1.1 (July 1999), (August 31, 2008)
  7. 7.
    Grigorenko, P., Saabas, A., Tyugu, E.: Visual tool for generative programming. ACM SIGSOFT Software Engineering Notes 30(5), 249–252 (2005)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Jüri Kivimaa
    • 1
  • Andres Ojamaa
    • 2
  • Enn Tyugu
    • 2
  1. 1.Estonian Defence Forces Training and Development Centre of, Communication and Information SystemsTallinnEstonia
  2. 2.Institute of Cybernetics at TUTTallinnEstonia

Personalised recommendations