A COMPREHENSIVE INFOLOGICAL MODEL OF CONFIDENTIAL INFORMATION PROTECTION OBJECTS

Author:

Metelkov Alexander1ORCID

Affiliation:

1. Saint-Petersburg university of State fire service of EMERCOM of Russia

Abstract

The problem of harmonization of approaches to the definition of information security objects is becoming increasingly relevant due to the growth of information arrays, the complexity of information technologies, technical and cryptographic means of information protection, and the increasing number of computer attacks, including on critical information infrastructure. Historically, the concept of objects of protection in Russia is associated with the requirements of state regulators, so it has different interpretations. The purpose of the study is to develop an infological model of information security objects. The goal of infological modeling may be to provide the most natural ways for a person to collect and present information about objects of protection for its consideration when creating protection systems and storing in a database. The author based on the analysis of the requirements of the main regulators of the Federal service according to the technical and export control of Russia and the Federal security service of Russia and the modeling method, an infological model of information security objects has been developed. This model is most consistent with the concept of object-oriented design, which is the basis for the development of complex software systems, the development of technology for designing databases of information security objects based on the ER-model. The entity-relationship model (ER-model) has several basic concepts, from which more complex objects are built according to predefined rules.

Publisher

St. Petersburg University of the State Fire Service of EMERCOM of Russia

Reference18 articles.

1. Гайдамакин Н.А. Разграничение доступа к информации в компьютерных системах. Екатеринбург: Изд-во Урал. ун-та, 2003. 328 с., Gajdamakin N.A. Razgranichenie dostupa k informacii v komp'yuternyh sistemah. Ekaterinburg: Izd-vo Ural. un-ta, 2003. 328 s.

2. Девянин П.Н. Обзорные лекции по моделям безопасности компьютерных систем // ПДМ. Приложение. 2009. № 2. С. 151–190., Devyanin P.N. Obzornye lekcii po modelyam bezopasnosti komp'yuternyh sistem // PDM. Prilozhenie. 2009. № 2. S. 151–190.

3. Bell D.E., LaPadula L.J. Secure computer system: Unified exposition and multics interpretation. MITRE CORP BEDFORD MA, 1976., Bell D.E., LaPadula L.J. Secure computer system: Unified exposition and multics interpretation. MITRE CORP BEDFORD MA, 1976.

4. Harrison M.A., Ruzzo W.L., Ullman J.D. Protection in operating systems // Commun. ACM. 1976. № 19. С. 461–471., Harrison M.A., Ruzzo W.L., Ullman J.D. Protection in operating systems // Commun. ACM. 1976. № 19. S. 461–471.

5. Аверченков В.И., Рытов М.Ю., Гайнулин Т.Р. Оптимизация выбора состава средств инженерно-технической защиты информации на основе модели Клементса-Хоффмана: научное издание // Вестн. Брянск. гос. техн. ун-та. 2008. № 1. С. 61–66., Averchenkov V.I., Rytov M.Yu., Gajnulin T.R. Optimizaciya vybora sostava sredstv inzhenerno-tekhnicheskoj zashchity informacii na osnove modeli Klementsa-Hoffmana: nauchnoe izdanie // Vestn. Bryansk. gos. tekhn. un-ta. 2008. № 1. S. 61–66.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3