VERBAL MODEL OF MANAGEMENT OF A VULNERABLE PROCESS OF DEDICATING THE ACCESS OF USERS TO THE SOFTWARE OF THE ELECTRONIC DOCUMENT SYSTEM

Author:

Alferov V. P.1,Drovnikova I. G.2,Obukhova L. A.2,Rogozin E. A.2

Affiliation:

1. Voronezh State Technical University

2. Voronezh Institute of the Ministry of the Interior of the Russian Federation

Abstract

Objectives Traditional methods for solving the problem of protecting the information resource of electronic document management systems based on protective basic functions (identification, authentication and verification of users, etc.) of available tools and information security subsystems have a significant drawback - inefficiency when an attacker masters the password of regular users. In order to eliminate it, it is necessary to develop new methods related to managing the weakly vulnerable process of delimiting user access not only to confidential information, but also to the software of the electronic document management system.Method One way to solve this problem is to use the modified “soft administration” method, which consists in automatically generating lists of allowed source files in the authorization matrix by reducing the lists and comparing file integrity functions with a reference list for an existing software package. This allows you to automate the process of developing access control rules and provide management of the weakly vulnerable process of access control to software tools of the electronic document management system.Result A verbal model is developed for automated control of a weakly vulnerable process of differentiating access to software tools of an electronic document management system, and a system of performance indicators for the functioning of a promising subsystem for protecting confidential information characterizing it as a control object is proposed.Conclusion The presented verbal model provides for the possibility of distributed control, in which the security administrator directly controls the specified process using a remote software tool. The formation (change) of the authority establishment matrix for managing a weakly vulnerable process of access control using a promising subsystem for protecting confidential information and the development of a system of indicators to comprehensively evaluate the effectiveness of its functioning is one of the most important tasks of protecting information from unauthorized access, guaranteeing the implementation of a security policy throughout the entire operation period secure electronic document management system. 

Publisher

FSB Educational Establishment of Higher Education Daghestan State Technical University

Subject

Polymers and Plastics,General Environmental Science

Reference28 articles.

1. Shan'gin V.F. Zashchita informatsii v komp'yuternykh sistemakh i setyakh: ucheb. posobiye / V.F. Shan'gin. — M.: DMK Press, 2012. 592 s. [Shangin V.F. Information Protection in computer systems and networks: proc. benefit / V.F. Shangin. — M.: DMK Press, 2012. 592 p. (in Russ)].

2. Metody i sredstva otsenki zashchishchonnosti avtomatizirovannykh sistem organov vnutrennikh del: monografiya [Elektronnyy resurs] / Ye.A. Rogozin [i dr.]; pod red. prof. Ye.A. Rogozina. — Voronezh: Voronezh. in-t MVD Rossii, 2017. 88 s. [Methods and tools for assessing the security of automated systems of bodies of internal Affairs: monograph [Electronic resource] / E.A. Rogozin [and others]; under the editorship of Professor E.A. Rogozin. Voronezh: Voronezh. Ministry of internal Affairs of Russia, 2017. 88 p. (in Russ)].

3. Metody i sredstva otsenki effektivnosti podsistemy zashchity konfidentsial'nogo informatsionnogo resursa pri yeyo proyektirovanii v sistemakh elektronnogo dokumentooborota: monografiya / I.I. Zastrozhnov [i dr.]. — Voronezh: Voronezh. gos. tekhn. un-t, 2015. 106 s. [Methods and means of assessing the effectiveness of the subsystem of protection of confidential information resource in its design in electronic document management systems: monograph / I.I. Zastrozhnov [and others]. Voronezh: Voronezh. state tech. UN-t, 2015. 106 p. (in Russ)].

4. Avsent'yev O.S. Metodika upravleniya zashchitoy informatsionnogo resursa sistemy elektronnogo dokumentooborota / O.S. Avsent'yev, I.G. Drovnikova, I.I. Zastrozhnov, A.D. Popov, Ye.A. Rogozin // Trudy SPIIRAN. № 2 (57) (2018). S.-Pb.: SPIIRAN, 2018. 2018. № 2(57). S. 188-210. DOI 10.15622/sp.57.8. [Avxentiev O.S. The management of protection information resource electronic document management system / O.S. Avxentiev, I.G. Drovnikova, I.I. Zastrozhnov, A.D. Popov, E.A. Rogozin // Proceedings of SPIIRAS. № 2 (57) (2018). S.-Pb.: Spiran, 2018. 2018. № 2 (57). P. 188-210. DOI 10.15622 / sp.57.8 (in Russ)].

5. Drovnikova I.G. Verbal'naya model' upravleniya razgranicheniyem dostupa pol'zovateley k konfidentsial'nym svedeniyam sistem avtomatizirovannogo dokumentooborota / I.G. Drovnikova, V.P. Alforov // Okhrana, bezopasnost', svyaz' — 2017: sb. st. Mezhdunar. nauch.-praktich. konf. V. 3. CH. 3. (Voronezh, 16 noyabrya 2017 g.). Voronezh: VI MVD Rossii, 2018. S. 77- 80. [Drovnikova I.G. Verbal control model differentiation of user access to confidential information of automated document management / I.G. Drovnikova, P.V. Alferov // Protection, security, communications — 2017: collection of articles]. scientific-practical conf. V. 3. Part 3. (Voronezh, 16 November 2017). Voronezh: VI Ministry of internal Affairs of Russia, 2018. P. 77-80 (in Russ)].

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3