2015 | OriginalPaper | Buchkapitel
The Modeling Algorithm of Communication Run Operations in a Network
verfasst von : Henryk Piech, Grzegorz Grodzki, Aleksandra Ptak
Erschienen in: Theory and Engineering of Complex Systems and Dependability
Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.
Wählen Sie Textabschnitte aus um mit Künstlicher Intelligenz passenden Patente zu finden. powered by
Markieren Sie Textabschnitte, um KI-gestützt weitere passende Inhalte zu finden. powered by
Communication processes have to be observed because there are possibilities that a different kind of threats will occur in the processes of exchanging information in a network. These threats are connected with: the possibility of decryption, losing jurisdiction, believing in and freshness of information, message interception by intruders, etc. We also consider the run of the communication protocol operation. Security attributes have been introduced to analyze the chosen aspects of security, which are proposed by Burrows, Abadi, Needham [4] and others. They have created the system of rules that defines interrelated parts of communication operations with security aspects. In this research we continued the analysis of security in the direction of building the model of auditing and dynamic modification of chosen factors (adequate to the security aspect) with the possibility to form a prognosis.