?
К вопросу о существовании доказуемо стойких систем облачных вычислений
Вестник Московского университета. Серия 15: Вычислительная математика и кибернетика. 2016. № 2. С. 32-38.
Zakharov V., Варновский Н. П., Шокуров А. В.
We study a formal model of cloud computing systems supplied with auxiliary cryptoservers. Assuming an existence of a secure threshold somewhat homomorphic open key cryptosystem we show how to build a secure cloud computing system in the framework of this model.
Zakharov V., Varnovsky N. P., Shokurov A. V., Moscow University Computational Mathematics and Cybernetics 2016 Vol. 36 No. 2 P. 83-88
We study a formal model of cloud computing systems with auxiliary cryptoservers. Assuming an existence of a secure threshold somewhat homomorphic public key cryptosystem we show how to build a cloud computing system secure in this model. ...
Added: October 13, 2016
Модель оценки рисков информационной безопасности информационных систем на основе облачных вычислений
Tsaregorodtsev A. V., Ермошкин Г. Н., Национальная безопасность / nota bene 2013 № 6 С. 46-54
Widespread acceptance and adoption of cloud computing calls for adaptation and development of existing risk assessment models of information systems. The approach suggested in this article can be used for risk assessment of information systems functioning on the basis of cloud computing technology, and assess the effectiveness of security measures. ...
Added: March 17, 2014
Isaev E., Dumsky D., Samodurov V. et al., Математическая биология и биоинформатика 2015 Т. 10 № 2 С. 567-579
The rapid development of information technology in today's society dictates new requirements for information security technologies of data, methods of remote access and data processing, integrated reduction of financial expenses on working with information. In recent years, the ideal solution to all these problems that is widely suggested is the concept of cloud computing. This ...
Added: December 19, 2015
Tsaregorodtsev A. V., Дербин Е. А., Мухин И. Н., Информация и безопасность 2015 Т. 18 № 3 С. 408-411
The use of cloud computing to build of IT-infrastructure of the organization implies the refusal of the organization direct control over the security aspects. There is a need for solving the problem of data privacy in the design architecture based on cloud computing technology. In the article the simulation method of data processing using Petri ...
Added: March 15, 2016
Tsaregorodtsev A. V., Мухин И. Н., Белый А. Ф., Информация и безопасность 2015 Т. 18 № 3 С. 404-407
The widespread use of cloud computing calls for adaptation and refinement of existing approaches to the construction of information and telecommunication systems. Data migrating to the cloud-based architecture enables to reduce total cost of implementation and maintenance of infrastructure and reduces development time for new business applications. Thus, the question of information security remains open. ...
Added: March 15, 2016
Tsaregorodtsev A. V., Мухин И. Н., Боридько С. И., Информация и безопасность 2015 Т. 18 № 3 С. 400-403
Due to the fact that cloud computing bring the new challenges in the field of information security, it is imperative for the organization to control the process of information security management in the cloud. The level of confidence in the services provided can vary significantly depending on the goals of the organization, the structure of ...
Added: March 15, 2016
Samodurov V., Kornilov V., Isaev E., Вопросы оборонной техники. Серия 16: Технические средства противодействия терроризму 2016 № 7-8 С. 139-145
The paper examines the main problems of ensuring information security of cloud technologies, technical and legislative. It discussed the ways to improve the security of cloud computing: the choice of the most secure cloud model, legal ways to improve the security of cloud. ...
Added: October 16, 2016
Tsaregorodtsev A. V., Ермошкин Г. Н., Национальная безопасность / nota bene 2013 № 5 С. 69-79
Change of a contour of safety and exit of critical assets of the organizations from under internal control with the subsequent migration of these assets on cloudy Wednesday nominated a problem of management of information security of the corporate systems functioning on the basis of technology of cloud computing to the first place. All this ...
Added: March 26, 2015
Tsaregorodtsev A. V., Качко А. К., Лавриненко М. М., Безопасность информационных технологий 2014 № 1 С. 22-27
In response to the ever growing needs in the storage and processing of data the main position are occupied by informational-telecommunication systems, operating on the basis of cloud computing. In this case, the key point in the use of cloud computing is the problem of information security. This article is primarily intended to cover the ...
Added: March 26, 2015
М., Протвино : Институт физико-технической информатики, 2017
Сборник статей и тезисов, являющиеся результатами научных исследований, охватывающими самые актуальные современные темы в области теории управления, визуализации и
принятия решений, а также в сфере обеспечения безопасности. ...
Added: February 23, 2018
Kuznetsov S. D., Turdakov D. Y., Борисенко О. Д., Труды Института системного программирования РАН 2014 Т. 26 № 4 С. 33-44
This article is dedicated to automation of cluster creation and management for Apache Spark MapReduce implementation in Openstack environments. As a result of this project open-source (Apache 2.0 license) implementation of toolchain for virtual cluster on-demand creation in Openstack environments was presented. The article contains an overview of existing solutions for clustering automation in cloud ...
Added: November 26, 2017
Tsaregorodtsev A. V., Нелинейный мир 2013 Т. 11 № 9 С. 610-621
Use of cloud computing applications and services requires review and adaptation of existing formal models for informational telecommunication systems security. It is necessary to consider the benefits of cloud deployment models and provide the procedure for allocating process among components of cloud computing environment for achieving confidentiality and data protection. ...
Added: March 26, 2015
Борисенко О. Д., Пастухов Р. К., С.Д. Кузнецов, Труды Института системного программирования РАН 2016 Т. 28 № 6 С. 111-120
Apache Spark is a framework providing fast computations on Big Data using MapReduce model. With cloud environments Big Data processing becomes more flexible since they allow to create virtual clusters on-demand. One of the most powerful open-source cloud environments is Openstack. The main goal of this project is to provide an ability to create virtual ...
Added: January 25, 2018
Zykov S. V., Кукушкин А. В., Безопасность информационных технологий 2014 № 1 С. 65-66
В работе предлагается построение модели данных об управлении проектом на уровне
его структурных моделей с использованием ER-нотации, применяемой при проектировании баз данных. Построенная
модель дополняется логическими и функциональными связями, соответствующими различным
методам управления проектами и может рассматриваться как семантическая сеть. ...
Added: February 16, 2016
Suvorov A., Матанцева М. О., Plotnikova E. G., Безопасность в техносфере 2018 Т. 7 № 5 С. 35-42
A review of the cyber insurance domain has been carried out with a description of classical terms from the insurance industry. Have been considered two the most comprehensive today definitions of cyber risk in authors’ opinion. A diagram of processes for cyber risk management using insurance has been presented, and the place of cyber-risk among ...
Added: October 2, 2019
Zarubin A., Kharitonov S., Денисов Д. В. et al., Прикладная информатика 2020 Т. 15 № 3 (87) С. 75-90
The rapid development of information technologies, the introduction of new cloud services, and the transfer of employees to remote work necessitate the adequate development of data leak Prevention (DLP) systems. The purpose of this article is to determine factors that affect this process and identify main trends in the development of DLP systems in the ...
Added: July 21, 2020
Baranov A., Baranov P., Проблемы информационной безопасности. Компьютерные системы 2018 № 4 С. 62-67
The paper examines probability-theoretic models of information distortion at message level. We research control sum distribution segments that are typical for network protocols like TCP.
As an addition operation we use both bitwise coordinate addition and addition of numbers in binary code with carry. Control sum error probability for asymptotic assessments provided distortion probability is low ...
Added: July 31, 2019
Evsyutin O., Култаев П. И., Multimedia Tools and Applications 2021 Vol. 80 No. 7 P. 11217-11238
The paper presents a new algorithm for embedding information in the frequency domain of the discrete wavelet-transform (DWT) of digital images. A block version of quantization index modulation (QIM) is used as a basic embedding operation. A distinctive feature of the algorithm consists in the adaptive selection of the data block size depending on the ...
Added: December 24, 2020
Baranov A., Baranov P., Проблемы информационной безопасности. Компьютерные системы 2019 № 4 С. 0-0
The paper considers error probability in every of four message block integrity checking methods: digital signature, cyclical redundant code, control sums in vector space over a field of two elements and control sums in a ring of integers. Comparison of asymptotic representations of transmitted binary signal and for large transmitted block’s volume is presented in ...
Added: December 29, 2019
Tsaregorodtsev A. V., Los A., Sorokin A., Национальная безопасность / nota bene 2015
В статье рассматриваются вопросы обеспечения информационной безопасности при проведении облачных вычислений. Информационно-телекоммуникационные системы, функционирующие на основе технологии облачных вычислений, в последнее время получают все большее распространение в связи с постоянно растущими потребностями в вопросах обработки и хранения больших объемов данных, что подтверждает актуальность рассматриваемых в статье вопросов. При этом ключевым моментом при использовании облачных вычислений ...
Added: October 20, 2015
Baranov A., Baranov P., Проблемы информационной безопасности. Компьютерные системы 2019 № 3 С. 35-40
Control sum mechanism efficiency research aimed at distortion revealing in a message being transmitted is a relevant task that is solved using different possible information transfer operation condition models.
In the paper distortions are modelled as an overlay of noise component with low signal/noise ratio , which poses most practical interest. Considered class of control sums ...
Added: December 29, 2019
Baranov A., Baranov P., Проблемы информационной безопасности. Компьютерные системы 2016 № 1 С. 70-75
This paperwork is dedicated to research of k-length CRC value distribution for data interval with volume n. It is shown in research [1] that CRC value could be represented as a sum of special-way formed random vectors over k-dimension vector space GFk(2) over a two-element 0,1-field (GF(2)).If the message or errors are modeled using independent random ...
Added: December 5, 2015
Elin V., Вестник Академии права и управления 2016 № 3 (44) С. 78-84
The peculiarities of information security in the implementation of cloud services in the Russian Federation in view of the legal characteristics of cloud services providers, status information as an object of legal regulation, the characteristics of restricted information and specifi conclusion of civil law contracts. ...
Added: November 17, 2016
Baranov P., Beibutov E., Business Informatics 2015 No. 4 P. 71-78
This paperwork overviews core technologies implemented by comparably new products at information security market - web application firewalls. Web applications are a very wide-used and convenient way of presenting remote users with access to corporate information resources. It can however become single point of failure rendering all the information infrastructure unreachable for legitimate clients. To ...
Added: December 5, 2015