Military academy of communication corps (Krasnodar branch office)
Author list of organization
List of articles written by the authors of the organization
-
AUTOMATIC CLASSIFICATION OF FORMAL DOCUMENTS IN ELECTRONIC DOCUMENT MANAGEMENT SYSTEM
Description
This article presents a method for automatic classification of electronic documents, based on the analysis of document metadata with using the final predicates algebra
-
Description
In the given article the mathematical representation analysis of documental reference model of the automated system in the information areas of the actor’s liability is made, which allows to make a conclusion of discretionary access control
-
Description
In the article, we present the mathematical model of referring documents entering the automated system to the spheres of users responsibility. The possibility of application of mathematical apparatus of final predicates algebra as a basic means of model description is proved
-
MATHEMATICAL SOFTWARE FOR DETECTING CONFIDENTIAL DATA IN ELECTRONIC DOCUMENTS
Description
In the article, we develop the software for process of confidential data detection based on the knowledge bases technology. The algorithm of detection of confidential data in the electronic documents transferred outbound of protected information system, due to application of linguistic technologies of the thorough text analysis is presented. The estimation of computing complexity of the developed algorithm is made up. The developed data structures and algorithm are realized in the programming language C++. Results of the experiments, confirmed workability of the developed algorithm are presented. The performed experimental researches of the developed algorithm have shown its practical applicability. The estimation of quality of confidential data detection is made up. The obtained estimations of detection quality have shown, that the developed structures of data and algorithm provide more effective and qualitative solution of problems of the confidential information detection in electronic documents, at due to application of knowledge bases technology where the subject domain of the analyzed information is considered. Distinctive feature of the developed algorithm of confidential data detection is the use of rapid access to hashed concept ontographs simultaneous implementation of knowledge base rules, which allows raising indicators of completeness and accuracy of detection. A scope of application of the developed software is the protection frames of the information intended for revealing of an information transfer containing data of confidential character in electronic documents outbound of protected information system with violation of security policy
-
Description
The article defines the parameters and criteria for detection of computer attacks; model and method of detection of computer attacks in the ITCS on the basis of the inductive pro-state forecasting are developed
-
01.00.00 Physical-mathematical sciences
Description
Multilevel bionic algorithm for detection and identification of software and hardware impacts on telecommunication networks is considered in the article. The results of applying of the software implementation of the algorithm are discussed
-
01.00.00 Physical-mathematical sciences
Description
The model of functioning of the telecommunication network in the conditions of three main stages of typical software and hardware impact is considered in the article. The factors, affecting the quality of the detection of software and hardware impacts are determined
-
Description
The article presents different types of electronic docu-ments allowing to create the unique searching-for-information thesaurus
-
PRESENTATION OF MANDATORY POLICY OF ACCESS CONTROL VIA THE HARRISONRUSSO-WILLIAM’S MODEL
Description
The accepted model of the access control is realized with the monitor of safety in the protected automated information system. Models of safety are considered, as a rule, as a system which is a single whole and has the uniform monitor of safety. Nevertheless, the architecture of the real automated information systems and processes of their functioning can be characterized by distribution. The distributed automated information system consists more than of one local segment representing isolated set of subjects and objects of access. In the distributed system local segments can be realized both on the basis of discretionary, and on the basis of mandatory models of safety (i.e. to be diverse). One of directions of a safety in this case is realization of the general monitor of the safety providing the uniform (coordinated) policy of access control. For safe interaction of patchwork systems it’s necessary to bring them to a single model. Hence, while the integration of information systems the problem of their interaction becomes persistent. Thus in the systems processing the information of a various level of confidentiality, it is necessary to realize mandatory access control. In given clause the mandatory policy of the safety presented by classical model of Bell-LaPadula, is described by the elements of classical model of Harrison-Russo-William. Using the mechanisms of change of a matrix access the opportunity of assignment and change of confidentiality marks is described and the observance of safe practices within the limits of mandatory access control is analyzed. The safety of application of the given approach has been proved. The perspective direction of research has been defined
-
APPLICATION OF CODES WITH NATURAL REDUNDANCY FOR INFORMATION PROTECTION
Description
In the article we provide a survey of cryptographic systems on the basis of unjammable coding; we offer the aspect of codes with natural redundancy for the solution of a problem of simultaneous protection of the information and detection and correction of errors; the demonstration is resulted that codes with natural redundancy are group codes