Sistemy i Sredstva Informatiki [Systems and Means of Informatics]
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Impact factor

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Sistemy i Sredstva Inform.:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Sistemy i Sredstva Informatiki [Systems and Means of Informatics], 2015, Volume 25, Issue 3, Pages 78–93
DOI: https://doi.org/10.14357/08696527150305
(Mi ssi418)
 

This article is cited in 9 scientific papers (total in 9 papers)

Possibilities of secure architecture creation for dynamically changing information systems

A. A. Grushoa, N. A. Grushoa, E. E. Timoninaa, S. Ya. Shorginb

a Institute of Informatics Problems, Federal Research Center "Computer Science and Control" of the Russian Academy of Sciences, 44-2 Vavilov Str., Moscow 119333, Russian Federation
b Federal Research Center "Computer Science and Control" of Russian Academy of Sciences, 44-2 Vavilov Str., Moscow 119333, Russian Federation
Full-text PDF (348 kB) Citations (9)
References:
Abstract: The paper is devoted to research of existence of information system security architecture. The authors assume dynamical changes in the distributed information system in which along with valuable information resources, there can be high-risk components. Process of consecutive synthesis of secure architecture at which there is the compromise with initial requirements for security is constructed. Consistency of requirements of local security policies and a security policy in the integrated system is automatically reached. The methodology of creation of the protected information system with unsecure components is suggested in practice. In the paper, the elements of known security policies are applied: Multilevel Security (MLS), Role-Based Access Control (RBAC), etc. Known mechanisms and security protocols which define the trust to the whole system are used whenever it is possible. In the constructed secure architecture, it is necessary to use additional mechanisms of security — security servers. Functionalities of some types of security servers are constructed by standard methods. When the analysis of semantics is necessary, the requirements to the security server raise.
Keywords: information security of information system; valuable information resources; security policies; architecture of the distributed information system.
Funding agency Grant number
Russian Foundation for Basic Research 15-07-02053
Received: 12.08.2015
Bibliographic databases:
Document Type: Article
Language: Russian
Citation: A. A. Grusho, N. A. Grusho, E. E. Timonina, S. Ya. Shorgin, “Possibilities of secure architecture creation for dynamically changing information systems”, Sistemy i Sredstva Inform., 25:3 (2015), 78–93
Citation in format AMSBIB
\Bibitem{GruGruTim15}
\by A.~A.~Grusho, N.~A.~Grusho, E.~E.~Timonina, S.~Ya.~Shorgin
\paper Possibilities of secure architecture creation for dynamically changing information systems
\jour Sistemy i Sredstva Inform.
\yr 2015
\vol 25
\issue 3
\pages 78--93
\mathnet{http://mi.mathnet.ru/ssi418}
\crossref{https://doi.org/10.14357/08696527150305}
\elib{https://elibrary.ru/item.asp?id=24347066}
Linking options:
  • https://www.mathnet.ru/eng/ssi418
  • https://www.mathnet.ru/eng/ssi/v25/i3/p78
  • This publication is cited in the following 9 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Системы и средства информатики
    Statistics & downloads:
    Abstract page:406
    Full-text PDF :105
    References:56
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024