Enterprise information risk management based on multi-agent model

Enterprise information risk management based on multi-agent model

Cao Hu Luo Haining  Jiao Di  Ren Fei  Jiang Dongxing  Tang Ming 

Westone Information Industry Inc., Beijing 100067, China

State Information Center, Beijing 100045, China

Corresponding Author Email: 
job_caohu@163.com
Page: 
56-58
|
DOI: 
https://doi.org/10.18280/rces.050303
Received: 
27 April 2018
|
Accepted: 
18 August 2018
|
Published: 
30 September 2018
| Citation

OPEN ACCESS

Abstract: 

This paper creates a risk management model of enterprise information based on graph theory and the multi-agent system, and discloses the relationship between agents and information elements. According to the OSI framework, five information elements were included in the modelling, namely, authentication, access control, data security, data integrity and non-repudiation. The potential functions were introduced to depict the interaction between various information elements: the attractive force means the agents hold the same opinions, and the repulsive force means the agents disagree with each other, calling for adjustment. The control law based on smooth potential functions was also adopted for the modelling process. Finally, the proposed model was proved innovative and effective through a simulation on five robots. The research findings shed new light on risk management of enterprise information.

Keywords: 

risk management, enterprise information, multi-agent system, potential function

1. Introduction
2. Multi-Agent System
3. Enterprise Information Framework Based on Graph Theory
4. Multi-Agent Information Model
5. Experimental Verification
6. Conclusions
  References

[1] Agrawal V. (2017). A Comparative Study on Information Security Risk Analysis Methods. Journal of Computers 12(1): 57-67. http://dx.doi.org/10.17706/jcp.12.1.57-67

[2] Vlek C, Stallen PJ. (1981). Judging risks and benefits in the small and in the large enterprise. Organizational Behavior and Human Performance 28(2): 235-271. http://dx.doi.org/10.1016/0030-5073(81)90024-6 

[3] Cao H, Bai Y, Liu H. (2012). Distributed rigid formation control algorithm for multi-agent systems. Kybernetes 41(10): 1650-1661. http://dx.doi.org/10.1108/03684921211276819

[4] Cao H, Bai Y, Chen J, Fang H. (2013). Control of 2D minimally persistent formations with three co-leaders in a cycle. International Journal of Advanced Robotic Systems 10(21): 1-7. http://dx.doi.org/10.5772/54494

[5]  Olfati-Saber R, Murray R. (2002). Distributed cooperative control of multiple vehicle formations using structural potential functions. IFAC Proceedings Volumes 35 (1): 495-500. http://dx.doi.org/10.3182/20020721-6-ES-1901.00244

[6] Asimow L, Roth B. (1978). Rigidity of graphs. Transactions of the American Mathematical Society (245): 279-289. http://dx.doi.org/10.1090/S0002-9947-1978-0511410-9