Skip to main content
Log in

Information security architecture synthesis in distributed information computation systems

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

This work considers the task of synthesizing information security architecture in the distributed information computation systems. The synthesis has been based on elementary structures described in the form of diagrams of solving action protection problems in the process of computation in the computer system and during network exchange.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. GOST (State Standard) R ISO/MEK 15408-1-2012: Information Technology. Methods and Means of Ensuring Security. Criteria for Assessing the Security of Information Technology. Part 1. Introduction and the General Model, 2014.

  2. GOST (State Standard) R ISO/MEK 15408-2-2013: Information Technology. Methods and Means of Ensuring Security. Criteria for Assessing the Security of Information Technology. Part 2. Functional Safety Requirements, 2014.

  3. GOST (State Standard) R ISO/MEK 15408-3-2013: Information Technology. Methods and Means of Ensuring Security. Criteria for Assessing the Security of Information Technology. Part 3. Components of Confidence in Security, 2014.

  4. Buecker, A., Carreno, A.V., Field, N., Hockings, C., Kawer, D., Mohanty, S., and Monteiro, S., Enterprise Security Architecture Using IBM Tivoli Security Solutions, IBM: Redbook, 2007.

    Google Scholar 

  5. Ramachandran, J., Designing Security Architecture Solutions, J. Willey, Inc., 2002.

    Google Scholar 

  6. Zegzhda, D.P. and Stepanova, T.V., Large-scale systems security evolution: Control theory approach, Proceedings of the 7th International Conference on Security of Information and Networks, September 8–10, 2015, Sochi, 2015.

    Google Scholar 

  7. Zegzhda, P.D., Zegzhda, D.P., and Nikolskiy, A.V., Using graph theory for cloud system security modeling, Lect. Notes Comput. Sci., 2012, vol. 7531, pp. 309–318.

    Article  Google Scholar 

  8. Unified Security Architecture for enterprise network security, Nortel Networks, 2002.

  9. STO BR IBBR-1.0-2014: Providing Information Security of Organizations of the Banking System of the Russian Federation. General Provisions, Moscow: Bank Rossii, 2014.

  10. Grusho, A.A., Primenko, E.A., and Timonina, E.E., Teoreticheskie osnovy komp’yuternoi bezopasnosti: Ucheb. posobie dlya studentov vyssh. ucheb. zavedenii (Theoretical Foundations of Computer Security: Textbook), Moscow: Izd. Tsentr Akademiya, 2009.

    Google Scholar 

  11. Grusho, A.A., Grusho, N.A., Levykin, M.V., and Timonina, E.E., Secure architectures of distributed information-computing systems based on complex virtualization, Probl. Inf. Bezop., Komp’yut. Sist., 2016, no. 4, pp. 31–35.

    Google Scholar 

  12. Grusho, A.A., Grusho, N.A., Timonina, E.E., and Shorgin, S.Ya., Possibilities for constructing a secure architecture for a dynamically changing information system, Sist. Sredstva Inf., 2015, vol. 25, no. 3, pp. 78–93.

    Google Scholar 

  13. McGeer, R., Verification of switching network properties using satisfiability, Proceedings of 2012 IEEE International Conference on Communications (ICC), Ottawa, 2012, pp. 6638–6644.

    Chapter  Google Scholar 

  14. Grusho, A.A., Zabezhailo, M.I., Zatsarinnyi, A.A., and Piskovskii, V.O., Safe automatic reconfiguration of cloud computing environments, Sist. Sredstva Inf., 2016, vol. 26, no. 3, pp. 83–92.

    Google Scholar 

  15. Grusho, A.A. and Terekhina, I.Yu., Consistency analysis of reconfiguration of a software-configurable network, Sist. Sredstva Inf., 2017, vol. 27, no. 3, pp. 11–21.

    Google Scholar 

  16. Sandhu, R., Krishnan, R., Niu, J., and Winsborough, W.H., Group-centric models for secure and agile information sharing, Proc. of MMM-ACNS 2010, Kotenko, I. and Skormin, I., Eds., 2010, pp. 55–69.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. A. Grusho.

Additional information

Original Russian Text © A.A. Grusho, N.A. Grusho, E.E. Timonina, 2017, published in Problemy Informatsionnoi Bezopasnosti, Komp’yuternye Sistemy.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Grusho, A.A., Grusho, N.A. & Timonina, E.E. Information security architecture synthesis in distributed information computation systems. Aut. Control Comp. Sci. 51, 799–804 (2017). https://doi.org/10.3103/S0146411617080089

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411617080089

Keywords

Navigation