?
Метод моделирования маршрутов распределения обработки критичных данных в гибридной среде облачных вычислений на основе модифицированных сетей Петри
Информация и безопасность. 2015. Т. 18. № 3. С. 408-411.
Tsaregorodtsev A. V., Дербин Е. А., Мухин И. Н.
The use of cloud computing to build of IT-infrastructure of the organization implies the refusal of the organization direct control over the security aspects. There is a need for solving the problem of data privacy in the design architecture based on cloud computing technology. In the article the simulation method of data processing using Petri nets based on the requirements of organization's security policy are considered. Such approach allows to obtain important information about the structure of multi-level access control system in a hybrid cloud environment.
Модель оценки рисков информационной безопасности информационных систем на основе облачных вычислений
Tsaregorodtsev A. V., Ермошкин Г. Н., Национальная безопасность / nota bene 2013 № 6 С. 46-54
Widespread acceptance and adoption of cloud computing calls for adaptation and development of existing risk assessment models of information systems. The approach suggested in this article can be used for risk assessment of information systems functioning on the basis of cloud computing technology, and assess the effectiveness of security measures. ...
Added: March 17, 2014
Tsaregorodtsev A. V., Мухин И. Н., Боридько С. И., Информация и безопасность 2015 Т. 18 № 3 С. 400-403
Due to the fact that cloud computing bring the new challenges in the field of information security, it is imperative for the organization to control the process of information security management in the cloud. The level of confidence in the services provided can vary significantly depending on the goals of the organization, the structure of ...
Added: March 15, 2016
Zakharov V., Варновский Н. П., Шокуров А. В., Вестник Московского университета. Серия 15: Вычислительная математика и кибернетика 2016 № 2 С. 32-38
We study a formal model of cloud computing systems supplied with auxiliary cryptoservers. Assuming an existence of a secure threshold somewhat homomorphic open key cryptosystem we show how to build a secure cloud computing system in the framework of this model. ...
Added: October 13, 2016
Isaev E., Dumsky D., Samodurov V. et al., Математическая биология и биоинформатика 2015 Т. 10 № 2 С. 567-579
The rapid development of information technology in today's society dictates new requirements for information security technologies of data, methods of remote access and data processing, integrated reduction of financial expenses on working with information. In recent years, the ideal solution to all these problems that is widely suggested is the concept of cloud computing. This ...
Added: December 19, 2015
Tsaregorodtsev A. V., Мухин И. Н., Белый А. Ф., Информация и безопасность 2015 Т. 18 № 3 С. 404-407
The widespread use of cloud computing calls for adaptation and refinement of existing approaches to the construction of information and telecommunication systems. Data migrating to the cloud-based architecture enables to reduce total cost of implementation and maintenance of infrastructure and reduces development time for new business applications. Thus, the question of information security remains open. ...
Added: March 15, 2016
Samodurov V., Kornilov V., Isaev E., Вопросы оборонной техники. Серия 16: Технические средства противодействия терроризму 2016 № 7-8 С. 139-145
The paper examines the main problems of ensuring information security of cloud technologies, technical and legislative. It discussed the ways to improve the security of cloud computing: the choice of the most secure cloud model, legal ways to improve the security of cloud. ...
Added: October 16, 2016
Zakharov V., Varnovsky N. P., Shokurov A. V., Moscow University Computational Mathematics and Cybernetics 2016 Vol. 36 No. 2 P. 83-88
We study a formal model of cloud computing systems with auxiliary cryptoservers. Assuming an existence of a secure threshold somewhat homomorphic public key cryptosystem we show how to build a cloud computing system secure in this model. ...
Added: October 13, 2016
Борисенко О. Д., Пастухов Р. К., С.Д. Кузнецов, Труды Института системного программирования РАН 2016 Т. 28 № 6 С. 111-120
Apache Spark is a framework providing fast computations on Big Data using MapReduce model. With cloud environments Big Data processing becomes more flexible since they allow to create virtual clusters on-demand. One of the most powerful open-source cloud environments is Openstack. The main goal of this project is to provide an ability to create virtual ...
Added: January 25, 2018
Lomazova I. A., Fundamenta Informaticae 2010 Vol. 101 No. 1-2 P. 59-70
In this work we consider modeling of workflow systems with Petri nets. To increase flexibility and give tools for workflow models re-engineering we extend the formalism of workflow nets by considering systems of interacting nets. Then we study soundness - the main correctness property of workflow processes - and show, that for a special class ...
Added: November 19, 2012
Suvorov A., Матанцева М. О., Plotnikova E. G., Безопасность в техносфере 2018 Т. 7 № 5 С. 35-42
A review of the cyber insurance domain has been carried out with a description of classical terms from the insurance industry. Have been considered two the most comprehensive today definitions of cyber risk in authors’ opinion. A diagram of processes for cyber risk management using insurance has been presented, and the place of cyber-risk among ...
Added: October 2, 2019
Elin V., Вестник Академии права и управления 2016 № 3 (44) С. 78-84
The peculiarities of information security in the implementation of cloud services in the Russian Federation in view of the legal characteristics of cloud services providers, status information as an object of legal regulation, the characteristics of restricted information and specifi conclusion of civil law contracts. ...
Added: November 17, 2016
Baranov A., Baranov P., Проблемы информационной безопасности. Компьютерные системы 2018 № 4 С. 62-67
The paper examines probability-theoretic models of information distortion at message level. We research control sum distribution segments that are typical for network protocols like TCP.
As an addition operation we use both bitwise coordinate addition and addition of numbers in binary code with carry. Control sum error probability for asymptotic assessments provided distortion probability is low ...
Added: July 31, 2019
Kuznetsov S. D., Turdakov D. Y., Борисенко О. Д., Труды Института системного программирования РАН 2014 Т. 26 № 4 С. 33-44
This article is dedicated to automation of cluster creation and management for Apache Spark MapReduce implementation in Openstack environments. As a result of this project open-source (Apache 2.0 license) implementation of toolchain for virtual cluster on-demand creation in Openstack environments was presented. The article contains an overview of existing solutions for clustering automation in cloud ...
Added: November 26, 2017
Tsaregorodtsev A. V., Нелинейный мир 2013 Т. 11 № 9 С. 610-621
Use of cloud computing applications and services requires review and adaptation of existing formal models for informational telecommunication systems security. It is necessary to consider the benefits of cloud deployment models and provide the procedure for allocating process among components of cloud computing environment for achieving confidentiality and data protection. ...
Added: March 26, 2015
Mitsyuk A. A., Shugurov I., Моделирование и анализ информационных систем 2014 Т. 21 № 4 С. 181-198
Process mining is a new emerging discipline related to process management, formal process models, and data mining. One of the main tasks of process mining is the model synthesis (discovery) based on the event logs. A wide range of algorithms for process model discovery, analysis, and enhancement are developed. The real-life event logs often contain ...
Added: October 20, 2014
Zarubin A., Kharitonov S., Денисов Д. В. et al., Прикладная информатика 2020 Т. 15 № 3 (87) С. 75-90
The rapid development of information technologies, the introduction of new cloud services, and the transfer of employees to remote work necessitate the adequate development of data leak Prevention (DLP) systems. The purpose of this article is to determine factors that affect this process and identify main trends in the development of DLP systems in the ...
Added: July 21, 2020
Zykov S. V., Кукушкин А. В., Безопасность информационных технологий 2014 № 1 С. 65-66
В работе предлагается построение модели данных об управлении проектом на уровне
его структурных моделей с использованием ER-нотации, применяемой при проектировании баз данных. Построенная
модель дополняется логическими и функциональными связями, соответствующими различным
методам управления проектами и может рассматриваться как семантическая сеть. ...
Added: February 16, 2016
Baranov P., Beibutov E., Business Informatics 2015 No. 4 P. 71-78
This paperwork overviews core technologies implemented by comparably new products at information security market - web application firewalls. Web applications are a very wide-used and convenient way of presenting remote users with access to corporate information resources. It can however become single point of failure rendering all the information infrastructure unreachable for legitimate clients. To ...
Added: December 5, 2015
Tsaregorodtsev A. V., Los A., Sorokin A., Национальная безопасность / nota bene 2015
В статье рассматриваются вопросы обеспечения информационной безопасности при проведении облачных вычислений. Информационно-телекоммуникационные системы, функционирующие на основе технологии облачных вычислений, в последнее время получают все большее распространение в связи с постоянно растущими потребностями в вопросах обработки и хранения больших объемов данных, что подтверждает актуальность рассматриваемых в статье вопросов. При этом ключевым моментом при использовании облачных вычислений ...
Added: October 20, 2015
Baranov A., Baranov P., Проблемы информационной безопасности. Компьютерные системы 2019 № 4 С. 0-0
The paper considers error probability in every of four message block integrity checking methods: digital signature, cyclical redundant code, control sums in vector space over a field of two elements and control sums in a ring of integers. Comparison of asymptotic representations of transmitted binary signal and for large transmitted block’s volume is presented in ...
Added: December 29, 2019
Dworzanski L. W., Михайлов В. Е., Proceedings of the Institute for System Programming of the RAS 2017 Vol. 29 No. 4 P. 175-190
Well-structured transition systems (WSTS) became a well-known tool in the study of concurrency systems for proving decidability of properties based on coverability and boundedness. Each year brings new formalisms proven to be WSTS systems. Despite the large body of theoretical work on the WSTS theory, there has been a notable gap of empirical research of ...
Added: October 1, 2017
Baranov A., Baranov P., Проблемы информационной безопасности. Компьютерные системы 2019 № 3 С. 35-40
Control sum mechanism efficiency research aimed at distortion revealing in a message being transmitted is a relevant task that is solved using different possible information transfer operation condition models.
In the paper distortions are modelled as an overlay of noise component with low signal/noise ratio , which poses most practical interest. Considered class of control sums ...
Added: December 29, 2019
Vladimir A. Bashkin, Lomazova I. A., Fundamenta Informaticae 2012 Vol. 120 No. 3-4 P. 243-257
Resource-driven automata (RDA) are finite automata, sitting in the nodes of a finite system net and asynchronously consuming/producing shared resources through input/output system ports (arcs of the system net). RDAs themselves may be resources for each other, thus allowing the highly flexible structure of the model. It was proved earlier, that RDA-nets are expressively equivalent ...
Added: November 28, 2012
Evsyutin O., Култаев П. И., Multimedia Tools and Applications 2021 Vol. 80 No. 7 P. 11217-11238
The paper presents a new algorithm for embedding information in the frequency domain of the discrete wavelet-transform (DWT) of digital images. A block version of quantization index modulation (QIM) is used as a basic embedding operation. A distinctive feature of the algorithm consists in the adaptive selection of the data block size depending on the ...
Added: December 24, 2020