Informatics and Applications
2018, Volume 12, Issue 2, pp 44-49
HIERARCHICAL METHOD OF META DATA GENERATION FOR CONTROL OF NETWORK CONNECTIONS
- A. A. Grusho
- E. E. Timonina
- S. Ya. Shorgin
Abstract
An important class of threats for distributed information systems is the possibility of organization of illegal information interactions and, vice versa, prohibition of the allowed information interactions. For preventing these threats, creation of connections control with the help of meta data is proposed. Meta data are created on the basis of mathematical models of business processes which are provided in distributed information systems by a set of information technologies. In the paper, two methods of meta data creation for information technologies are considered. The suggested approach is based on hierarchical decomposition of information technologies and tasks.
[+] References (7)
- Grusho, A., M. Zabezhailo, and A. Zatsarinny. 2015. Kon- trol' i upravlenie informatsionnymi potokami v oblachnoy srede [Information flow monitoring and control in cloud computing environment]. Informatika i ee Primeneniya - Inform. Appl. 9(4):95-101.
- Grusho, A. A., E. E. Timonina, and S.Ya. Shorgin. 2017. Modelling for ensuring information security of the distributed information systems. 31th European Conference on Modelling and Simulation Proceedings. Digitaldruck Pirrot GmbHP Dudweiler, Germany. 656-660. Available at: http://www.scs- europe.net/dlib/2017/ecms2017acceptedpapers/0656- probstat_ECMS2017_0026.pdf (accessed February 20, 2018).
- Grusho, A., N. Grusho, M. Zabezhailo, A. Zatsarinny, and E. Timonina. 2017. Information security of SDN
on the basis of meta data. Computer network security. Eds. J. Rak, J. Bay, I.V. Kotenko, et al. Lecture notes in computer science ser. Springer. 10446:339-347. Available at: https://link.springer.com/chapter/10.1007/978-
3-319-65127-9_27 (accessed February 20, 2018).
- Grusho, A., E. Timonina, and S. Shorgin. 2017. Security models based on stochastic meta data. Analytical and computational methods in theory probability. Eds. V. Rykov, N. Singpurwalla, and A. Zubkov. Lecture notes in computer science ser. Springer. 10684:388-400. Available at: https://link.springer.com/chapter/10.1007/978- 3-319-71504-9_32 (accessed February 20, 2018).
- Grusho, A., Ed. Primenko, and E. Timonina. 2009. Teo- reticheskie osnovy komp'yuternoy bezopasnosti [Theoretical bases of computer security]. Moscow: Academy. 272 ð.
- Grusho, A. A., P.O. Abaev, S.Ya. Shorgin, and E. E. Timonina. 2017. Graphs for information security control in software defined networks. AIP Conf. Proc. 1863:090002. 4 p. Available at: http://aip.scitation.org/doi/pdf/10.1063/1.4992267 (accessed February 20, 2018).
- Nilsson, N.J. 1971. Problem-solving methods in artificial intelligence. New York, NY: McGraw-Hill Publ. Co. 255p.
[+] About this article
Title
HIERARCHICAL METHOD OF META DATA GENERATION FOR CONTROL OF NETWORK CONNECTIONS
Journal
Informatics and Applications
2018, Volume 12, Issue 2, pp 44-49
Cover Date
2018-05-30
DOI
10.14357/19922264180207
Print ISSN
1992-2264
Publisher
Institute of Informatics Problems, Russian Academy of Sciences
Additional Links
Key words
information security; distributed information systems; metadata; hierarchical decomposition; composite tasks
Authors
A. A. Grusho , E. E. Timonina , and S. Ya. Shorgin
Author Affiliations
Institute of Informatics Problems, Federal Research Center "Computer Science and Control" of the Russian Academy of Sciences, 44-2 Vavilov Str., Moscow 119333, Russian Federation
|