Systems and Means of Informatics
2016, Volume 26, Issue 4, pp 31-37
SECURITY EVALUATION IN SECURE ARCHITECTURE OF DISTRIBUTED INFORMATION SYSTEMS
- A. A. Grusho
- N. A. Grusho
- E. E. Timonina
Abstract
The necessary condition of secure architecture of distributed information systems is the possibility of effective enumerating of information flows and the analysis of their contents. Completeness of the analysis of security of distributed information systems comes down to completeness of enumerating of information flows and possibility of the analysis of their contents. Contradictions of secure architecture of distributed information systems can arise if there is a forbidden information flow, or a ban on an allowed information flow, or an admission of failure is possible. The paper gives an example of architecture of distributed information systems in which the analysis of interactions of components represents a complex computing problem and an example of secure architecture when it is possible to effectively analyze all interactions in distributed information systems.
[+] References (7)
- Grusho, A., N. Grusho, E. Timonina, and S. Shorgin. 2014. Bezopasnye arkhitektury raspredelennykh sistem [Secure architecture of the distributed systems]. Sistemy
i Sredstva Informatiki - Systems and Means of Informatics 24 (3): 18-31.
- Grusho, A., N. Grusho, E. Timonina, and S. Shorgin. 2015. Vozmozhnosti postroeniya bezopasnoy arkhitektury dlya dinamicheski izmenyayushcheysya informatsionnoy sis- temy [Possibilities of secure architecture creation for dynamically changing information systems]. Sistemy i Sredstva Informatiki - Systems and Means of Informatics 25(3):78-93.
- ISO/IEC 15408-1-2012. 2014. Informatsionnye tekhnologii. Metody i sredstva obes- pecheniya bezopasnosti. Kriterii otsenki bezopasnosti informatsionnykh tekhnologiy. Chast' 1. Vvedenie i obshchaya model' [Information technology. Security techniques. Evaluation criteria for IT security. Part 1. Introduction and general model]. Moscow: Standardinfo. 56 p.
- ISO/IEC 15408-2-2013. 2014. Informatsnnye tekhnologii. Metody i sredstva obes- pecheniya bezopasnosti. Kriterii otsenki bezopasnosti informatsionnykh tekhnologiy. Chast' 2. Funktsional'nye trebovaniya bezopasnosti [Information technology. Security techniques. Evaluation criteria for IT security. Part 2. Security functional requirements]. Moscow: Standardinfo. 161 p.
- ISO/IEC 15408-3-2013. 2014. Informatsionnye tekhnologii. Metody i sredstva obes- pecheniya bezopasnosti. Kriterii otsenki bezopasnosti informatsionnykh tekhnologiy. Chast' 3. Komponenty doveriya k bezopasnosti [Information technology. Security techniques. Evaluation criteria for IT security. Part 3. Security assurance components]. Moscow: Standardinfo. 150 p.
- Grusho, A., E. Primenko, andE. Timonina. 2009. Teoreticheskieosnovy komp'yuternoy bezopasnosti [Theoretical bases of computer security]. Moscow: Academy. 272 p.
- Grusho, A. A., M.I. Zabezhailo, A. A. Zatsarinnyy, and V. O. Piskovski. 2016. Bez- opasnaya avtomaticheskaya rekonfiguratsiya oblachnykh vychislitel'nykh sred [Secure automatic reconfiguration of cloudy computing]. Sistemy i Sredstva Informatiki - Systems and Means of Informatics 26(3):83-92.
[+] About this article
Title
SECURITY EVALUATION IN SECURE ARCHITECTURE OF DISTRIBUTED INFORMATION SYSTEMS
Journal
Systems and Means of Informatics
Volume 26, Issue 4, pp 31-37
Cover Date
2016-11-30
DOI
10.14357/08696527160403
Print ISSN
0869-6527
Publisher
Institute of Informatics Problems, Russian Academy of Sciences
Additional Links
Key words
secure architecture of distributed information systems; methods of the analysis of security of distributed information systems
Authors
A. A. Grusho , N. A. Grusho , and E. E. Timonina
Author Affiliations
Institute of Informatics Problems, Federal Research Center "Computer Science
and Control", Russian Academy of Sciences, 44-2 Vavilov Str., Moscow 119333, Russian Federation
|