{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,12,2]],"date-time":"2023-12-02T00:51:09Z","timestamp":1701478269659},"reference-count":0,"publisher":"IOS Press","isbn-type":[{"value":"9781643684444","type":"print"},{"value":"9781643684451","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"abstract":"Security policy feasibility assessment is to evaluate the ability of the implemented policy to resist threats, fix system vulnerabilities, etc., whether it is in the user\u2019s acceptable range, and also a measure of security and cost balance. There has been outstanding progress in the current research on automated security policies, and the implementation and application of various security policies are progressing well, but we should pay more attention to security policy effectiveness, which better reflects the risks and the scope and degree of risks accepted by the existing system. However, in many security policy evaluations, there is basically no comprehensive evaluation of existing security policies, and more often the existing vulnerabilities and the degree of risk after being threatened are presented, without quantitative and qualitative feasibility assessment. Based on the existing security policy evaluation methods, a method for assessing the feasibility of automated security protection policies is introduced.<\/jats:p>","DOI":"10.3233\/faia230796","type":"book-chapter","created":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T15:52:57Z","timestamp":1701445977000},"source":"Crossref","is-referenced-by-count":0,"title":["Automated Security Policy Feasibility Assessment"],"prefix":"10.3233","author":[{"given":"Yunfan","family":"Wang","sequence":"first","affiliation":[{"name":"State Grid Key Laboratory of Information & Network, State Grid Smart Grid Research Institute co., Ltd., China"}]},{"given":"Wenhao","family":"Ye","sequence":"additional","affiliation":[{"name":"State Grid Hunan Electric Power co., Ltd., China"}]},{"given":"Ning","family":"Li","sequence":"additional","affiliation":[{"name":"State Grid Hunan Electric Power co., Ltd., China"}]},{"given":"Liurong","family":"Pan","sequence":"additional","affiliation":[{"name":"Hunan SGIT Technology co., Ltd., China"}]}],"member":"7437","container-title":["Frontiers in Artificial Intelligence and Applications","Advances in Artificial Intelligence, Big Data and Algorithms"],"original-title":[],"link":[{"URL":"https:\/\/ebooks.iospress.nl\/pdf\/doi\/10.3233\/FAIA230796","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T15:53:08Z","timestamp":1701445988000},"score":1,"resource":{"primary":{"URL":"https:\/\/ebooks.iospress.nl\/doi\/10.3233\/FAIA230796"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,30]]},"ISBN":["9781643684444","9781643684451"],"references-count":0,"URL":"https:\/\/doi.org\/10.3233\/faia230796","relation":{},"ISSN":["0922-6389","1879-8314"],"issn-type":[{"value":"0922-6389","type":"print"},{"value":"1879-8314","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,30]]}}}