Skip to main content
Erschienen in: Automatic Control and Computer Sciences 8/2018

01.12.2018

Protection of Valuable Information in Information Technologies

Erschienen in: Automatic Control and Computer Sciences | Ausgabe 8/2018

Einloggen, um Zugang zu erhalten

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract—

This work considers the possibility of recovering valuable information when an intruder knows the results of information conversion and conversion in the framework of some information technology. The forest-type model of processable information is built. Approaches to protecting valuable information are investigated.
Literatur
1.
Zurück zum Zitat Grusho, A.A., Timonina, E.E., and Shorgin, S.Ya., The hierarchical method of metadata generation for managing network connections, Inf. Primen., 2018, vol. 12, no. 2, pp. 44-49. Grusho, A.A., Timonina, E.E., and Shorgin, S.Ya., The hierarchical method of metadata generation for managing network connections, Inf. Primen., 2018, vol. 12, no. 2, pp. 44-49.
2.
Zurück zum Zitat Grusho, A.A., Grusho, N.A., Timonina, E.E., and Shorgin, S.Ya., Secure architectures of distributed systems, Sist. Sredstva Inf., 2014, vol. 24, no. 3, pp. 18–31. Grusho, A.A., Grusho, N.A., Timonina, E.E., and Shorgin, S.Ya., Secure architectures of distributed systems, Sist. Sredstva Inf., 2014, vol. 24, no. 3, pp. 18–31.
3.
Zurück zum Zitat Grusho, A.A., Grusho, N.A., Timonina, E.E., and Shorgin, S.Ya., Possibilities for constructing a secure architecture for a dynamically changing information system, Sist. Sredstva Inf., 2015, vol. 25, no. 3, pp. 78–93. Grusho, A.A., Grusho, N.A., Timonina, E.E., and Shorgin, S.Ya., Possibilities for constructing a secure architecture for a dynamically changing information system, Sist. Sredstva Inf., 2015, vol. 25, no. 3, pp. 78–93.
4.
Zurück zum Zitat Azevedo de Amorim, A., Collins, N., DeHon, A., Demange, D., Hriţcu, C., Pichardie, D., Pierce, B.C., Pollack, R., and Tolmach, A., A verified information-flow architecture, J. Comput. Secur., 2016. doi 10.3233/jcs-15784 Azevedo de Amorim, A., Collins, N., DeHon, A., Demange, D., Hriţcu, C., Pichardie, D., Pierce, B.C., Pollack, R., and Tolmach, A., A verified information-flow architecture, J. Comput. Secur., 2016. doi 10.3233/jcs-15784
5.
Zurück zum Zitat Anshakov, O.M. and Fabrikantova, E.F., DSM-metod avtomaticheskogo porozhdeniya gipotez: Logicheskie i epistemologicheskie osnovanii (JSM-Method for Automatic Hypothesis Generation: Logical and Epistemological Grounds), Anshakov, O.M., Ed., Moscow: Knizhnyi dom LIBROKOM, 2009. Anshakov, O.M. and Fabrikantova, E.F., DSM-metod avtomaticheskogo porozhdeniya gipotez: Logicheskie i epistemologicheskie osnovanii (JSM-Method for Automatic Hypothesis Generation: Logical and Epistemological Grounds), Anshakov, O.M., Ed., Moscow: Knizhnyi dom LIBROKOM, 2009.
6.
Zurück zum Zitat Church, A., Introduction to Mathematical Logic, Princeton University Press, 1996.MATH Church, A., Introduction to Mathematical Logic, Princeton University Press, 1996.MATH
8.
Zurück zum Zitat Grusho, A., Grusho, N., and Timonina, E., Detection of anomalies in non-numerical data, Proceedings of the 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, Piscataway, NJ, 2016, pp. 273–276. Grusho, A., Grusho, N., and Timonina, E., Detection of anomalies in non-numerical data, Proceedings of the 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, Piscataway, NJ, 2016, pp. 273–276.
9.
Zurück zum Zitat Piotrovskii, R.G., Tekst, mashina, chelovek (Text, Machine, Man), Leningrad: Nauka, 1975. Piotrovskii, R.G., Tekst, mashina, chelovek (Text, Machine, Man), Leningrad: Nauka, 1975.
10.
Zurück zum Zitat Shannon, C., Raboty po teorii informatsii i kibernetike (Works on Information Theory and Cybernetics), Moscow: Inostrannaya literatura, 1963. Shannon, C., Raboty po teorii informatsii i kibernetike (Works on Information Theory and Cybernetics), Moscow: Inostrannaya literatura, 1963.
Metadaten
Titel
Protection of Valuable Information in Information Technologies
Publikationsdatum
01.12.2018
Erschienen in
Automatic Control and Computer Sciences / Ausgabe 8/2018
Print ISSN: 0146-4116
Elektronische ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411618080138

Weitere Artikel der Ausgabe 8/2018

Automatic Control and Computer Sciences 8/2018 Zur Ausgabe

Neuer Inhalt