10 research outputs found

    The Control of Information Security Indicators for Information Resources in Distributed Computing Environment Bases on the Reservation Strategies with Fractional Redundancy Rate

    No full text
    A way to increase security of information resources in distributed computing environments is to use some information resources management strategies. The goal of paper is to analyze the ways how to control the security indicators for information resources in distributed computing environments using the reservation strategies with fractional redundancy rate

    A Model for Evaluating Damage Inflicted Dye Destructive Events in the Computer Information System

    No full text
    Here we present a model to evaluate the mean expectation of damage inflicted by destructive events in the computer information system. A condition of damage reduction is deduced. Some ways how to guarantee supply of this condition are presented

    Protection of Documents, Cryptography and Secret Communications in Byzantium (the 4th—15th centuries)

    No full text
    Origin and evolution of cryptography in Byzantium haven’t been studied yet. We discuss here how the written texts were ciphered, how the integrity and authenticity of documents were ensured in Byzantium in the 4th—15th centuries A.D. The investigation let us to find the roots of some modern concepts of information security. In particular, we argue a hypothesis that the medieval Byzantium diplomatic protocol could be the prototype of modern cryptographic protocol

    The Security of Distributed Computing Systems with Various Reservation Strategies of Information Resources

    No full text
    A way to increase the functional stability of distributed computing systems in case of partial destruction is to use information resources with some reservation strategies. The paper is devoted to analysis of security indicators for information resources of distributed computing systems with various reservation strategies in case of confrontation with adversary

    The Comparative Evaluation of the Information Resources Management Strategies in Case of Partly Destroyed Distributed Computing Environment

    No full text
    The paper is about the investigation of eight information resources management strategies. The main result of this investigation is a complex of analytical evaluations which can be used to systematically analyze the information resources security indicators and to construct the information systems with predefined security indicators. The regularities been found in changing the availability, integrity and confidentiality indicators for information resources management strategies let to increase some of these indicators in certain conditions
    corecore