|
This article is cited in 2 scientific papers (total in 2 papers)
Security evaluation in secure architecture of distributed information systems
A. A. Grusho, N. A. Grusho, E. E. Timonina Institute of Informatics Problems, Federal Research Center "Computer Science and Control" of the Russian Academy of Sciences, 44-2 Vavilov Str., Moscow 119333, Russian Federation
Abstract:
The necessary condition of secure architecture of distributed information systems is the possibility of effective enumerating of information flows and the analysis of their contents. Completeness of the analysis of security of distributed information systems comes down to completeness of enumerating of information flows and possibility of the analysis of their contents. Contradictions of secure architecture of distributed information systems can arise if there is a forbidden information flow, or a ban on an allowed information flow, or an admission of failure is possible. The paper gives an example of architecture of distributed information systems in which the analysis of interactions of components represents a complex computing problem and an example of secure architecture when it is possible to effectively analyze all interactions in distributed information systems.
Keywords:
secure architecture of distributed information systems; methods of the analysis of security of distributed information systems.
Received: 13.09.2016
Citation:
A. A. Grusho, N. A. Grusho, E. E. Timonina, “Security evaluation in secure architecture of distributed information systems”, Sistemy i Sredstva Inform., 26:4 (2016), 31–37
Linking options:
https://www.mathnet.ru/eng/ssi487 https://www.mathnet.ru/eng/ssi/v26/i4/p31
|
Statistics & downloads: |
Abstract page: | 313 | Full-text PDF : | 86 | References: | 36 |
|