Loading

Logics and Illogic’s in Information Security Flow on Process Development Environment
Sivanesh kumar. A1, Vinod. D2, Velu. C.M3, Rajesh. M4

1Sivanesh kumar. A, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Chennai, India.

2Vinod. D, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Chennai, India.

3Velu. C.M, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Chennai, India.

4Rajesh. M, KRS College of Engineering, Vandavasi, India, Raga Academic Solutions, India.

Manuscript received on 16 September 2019 | Revised Manuscript received on 24 September 2019 | Manuscript Published on 11 October 2019 | PP: 1293-1297 | Volume-8 Issue-11S September 2019 | Retrieval Number: K126109811S19/2019©BEIESP | DOI: 10.35940/ijitee.K1261.09811S19

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The objective of the work is to propose a formal technique encompassing the logic and the illogic involved in the security of information science. The received or collected information about the existing or past security incidents in business processes is to be identified for their correctness and preciseness. The emphasis on various segments of the information is analyzed as per the intention of the informer and the involvement of the recipient. The expectation and the acceptance of business information is quantitatively modeled so as to take a correct decision with the proposed logics when multiple business processes handling variety of information with different truth factors are collaborated. The logical deduction, abduction and induction techniques are applied to minimize the vagueness and ambiguity factors. The preciseness of the present information and the emphasis of the past information related to security are formally used to predict the reality of future information security incidents in a business scenario.

Keywords: Business Process, Logics, Truth Factor, Collaboration, Information security, Vagueness, Reality
Scope of the Article: Information and Data Security