Shtemenko High Military School (Military Institute)
Author list of organization
List of articles written by the authors of the organization
-
MATHEMATICAL SYSTEM MODEL FOR DISCOVERY OF HIDDEN CHANNEL
DescriptionIn the given article, the mathematical system model for discovery of hidden channels in the network of packet data communication automatic systems, designed on the base of the analysis of building principles and inflexions of signals, sent through hidden channels is presented
-
Description
In the article, we present the mathematical model of referring documents entering the automated system to the spheres of users responsibility. The possibility of application of mathematical apparatus of final predicates algebra as a basic means of model description is proved
-
Description
The article presents different types of electronic docu-ments allowing to create the unique searching-for-information thesaurus
-
Description
In the given article the mathematical representation analysis of documental reference model of the automated system in the information areas of the actor’s liability is made, which allows to make a conclusion of discretionary access control
-
AUTOMATIC CLASSIFICATION OF FORMAL DOCUMENTS IN ELECTRONIC DOCUMENT MANAGEMENT SYSTEM
DescriptionThis article presents a method for automatic classification of electronic documents, based on the analysis of document metadata with using the final predicates algebra
-
DEVELOPING A COUNTERMEASURES TO USING COVERT CHANNELS IN PACKET-SWITCHED NETWORKS
DescriptionIn the given article a model which allows defining general characteristics of covert channels in packet-switched networks as well as countermeasures to covert channels developed on the basis of the model in question are presented
-
Description
In this article we consider the usage of HRU access matrix changing system allowing for information security system which makes mandatory access control in case of information security analysis by using an automatic classification of formalized documents in the system of electronic document management
-
PRESENTATION OF MANDATORY POLICY OF ACCESS CONTROL VIA THE HARRISONRUSSO-WILLIAM’S MODEL
DescriptionThe accepted model of the access control is realized with the monitor of safety in the protected automated information system. Models of safety are considered, as a rule, as a system which is a single whole and has the uniform monitor of safety. Nevertheless, the architecture of the real automated information systems and processes of their functioning can be characterized by distribution. The distributed automated information system consists more than of one local segment representing isolated set of subjects and objects of access. In the distributed system local segments can be realized both on the basis of discretionary, and on the basis of mandatory models of safety (i.e. to be diverse). One of directions of a safety in this case is realization of the general monitor of the safety providing the uniform (coordinated) policy of access control. For safe interaction of patchwork systems it’s necessary to bring them to a single model. Hence, while the integration of information systems the problem of their interaction becomes persistent. Thus in the systems processing the information of a various level of confidentiality, it is necessary to realize mandatory access control. In given clause the mandatory policy of the safety presented by classical model of Bell-LaPadula, is described by the elements of classical model of Harrison-Russo-William. Using the mechanisms of change of a matrix access the opportunity of assignment and change of confidentiality marks is described and the observance of safe practices within the limits of mandatory access control is analyzed. The safety of application of the given approach has been proved. The perspective direction of research has been defined
-
Description
The goal of the study is to research experimentally a pseudo-noise sequence acquisition method for multicarrier communication systems of MC-DSCDMA, that allows low hardware requirements and able to operate in low quality channels. The way of achieving this lies in using a specially developed computer model of algorithm in Simulink. The achieved results have shown high efficiency of the considered acquisition method in contrast to sequential search method. The proposed algorithm can be used in multicarrier systems for acquisition of aperiodic pseudo-noise sequences in wireless public networks and in military communication networks
-
Description
The goal of the study is to research time characteristics of pseudo-noise sequence acquisition method for multicarrier communication systems of MC-DSCDMA, that allows low hardware requirements and able to operate in low quality channels. The way of achieving this lies in using a mathematical model of algorithm. The achieved results show suitability of MC-DS-CDMA-signals optimization for pseudo-noise sequence acquisition efficiency increase. The achieved results can be applied in MC-DS-CDMA communication systems development