Skip to main content
Top

2017 | OriginalPaper | Chapter

Access Distribution Scheme to the Computer System Based on Fuzzy Logic

Authors : A. Shaikhanova, A. Zolotov, L. Dubchak, M. Karpinski, V. Karpinskyi

Published in: Graph-Based Modelling in Engineering

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper presents access distribution at computer system transmission of client-server data type. In order to enhance information protection fuzzy logic is applied to select the data encryption method. A server block diagram of such computer system has been developed based on the proposed fuzzy distribution of system access.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski B.S. Jr. (ed.) CRYPTO’97, 17th Annual International Cryptology Conference on Advances in Cryptology, Santa Barbara, CA, August 1997, pp. 513–525. Lecture Notes in Computer Science, No 1294. Springer, Heidelberg, (1997) Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski B.S. Jr. (ed.) CRYPTO’97, 17th Annual International Cryptology Conference on Advances in Cryptology, Santa Barbara, CA, August 1997, pp. 513–525. Lecture Notes in Computer Science, No 1294. Springer, Heidelberg, (1997)
4.
go back to reference Corner, D.E., Stevens, D.L.: Internetworking with TCP/IP, Vol III: Client-Server Programming and Applications. Prentice Hall, Upper Saddle River, NJ (2000) Corner, D.E., Stevens, D.L.: Internetworking with TCP/IP, Vol III: Client-Server Programming and Applications. Prentice Hall, Upper Saddle River, NJ (2000)
5.
go back to reference Gorbenko, I.D., Gorbenko, Y.I.: Prykladna kryptologia (Applied Cryptology). Fort, Kharkiv (2012) Gorbenko, I.D., Gorbenko, Y.I.: Prykladna kryptologia (Applied Cryptology). Fort, Kharkiv (2012)
6.
go back to reference Kshetri, N., Murugesan, S.: EU and US Cybersecurity strategies and their impact on businesses and consumers. Computer 10(46), 84–88 (2013) Kshetri, N., Murugesan, S.: EU and US Cybersecurity strategies and their impact on businesses and consumers. Computer 10(46), 84–88 (2013)
7.
go back to reference Kurose, J.F., Ross, K.W.: Computer Networking: A Top-Down Approach, 6th edn. Addison-Wesley, Boston (2011) Kurose, J.F., Ross, K.W.: Computer Networking: A Top-Down Approach, 6th edn. Addison-Wesley, Boston (2011)
8.
go back to reference Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer, Berlin (2007) Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer, Berlin (2007)
9.
go back to reference Moldovyan, A.A., Moldovyan, N.A., Sovyetov, B.A.: Kryptografiya (Cryptography). Lan’, St Petersburg (2000) Moldovyan, A.A., Moldovyan, N.A., Sovyetov, B.A.: Kryptografiya (Cryptography). Lan’, St Petersburg (2000)
10.
go back to reference Muir, J.: Techniques of Side Channel Cryptanalysis. Technical Report, Department of Combinatorics and Optimization, University of Waterloo (2001) Muir, J.: Techniques of Side Channel Cryptanalysis. Technical Report, Department of Combinatorics and Optimization, University of Waterloo (2001)
12.
go back to reference Stallings, W.: Cryptography and Network Security: Principles and Practice, 6th edn. Prentice Hall, Upper Saddle River, NJ (2013) Stallings, W.: Cryptography and Network Security: Principles and Practice, 6th edn. Prentice Hall, Upper Saddle River, NJ (2013)
13.
go back to reference Vasyltsov, I.V.: Ataky specialnoho vydu na kryptoprystroyi ta metody borot’by z nymy (The Attacks of Special Type on Crypto Devices and Methods of Dealing with Them). KOHPI, Kremenets (2009) Vasyltsov, I.V.: Ataky specialnoho vydu na kryptoprystroyi ta metody borot’by z nymy (The Attacks of Special Type on Crypto Devices and Methods of Dealing with Them). KOHPI, Kremenets (2009)
Metadata
Title
Access Distribution Scheme to the Computer System Based on Fuzzy Logic
Authors
A. Shaikhanova
A. Zolotov
L. Dubchak
M. Karpinski
V. Karpinskyi
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-39020-8_3

Premium Partners