Abstract
This work considers the task of synthesizing information security architecture in the distributed information computation systems. The synthesis has been based on elementary structures described in the form of diagrams of solving action protection problems in the process of computation in the computer system and during network exchange.
Similar content being viewed by others
References
GOST (State Standard) R ISO/MEK 15408-1-2012: Information Technology. Methods and Means of Ensuring Security. Criteria for Assessing the Security of Information Technology. Part 1. Introduction and the General Model, 2014.
GOST (State Standard) R ISO/MEK 15408-2-2013: Information Technology. Methods and Means of Ensuring Security. Criteria for Assessing the Security of Information Technology. Part 2. Functional Safety Requirements, 2014.
GOST (State Standard) R ISO/MEK 15408-3-2013: Information Technology. Methods and Means of Ensuring Security. Criteria for Assessing the Security of Information Technology. Part 3. Components of Confidence in Security, 2014.
Buecker, A., Carreno, A.V., Field, N., Hockings, C., Kawer, D., Mohanty, S., and Monteiro, S., Enterprise Security Architecture Using IBM Tivoli Security Solutions, IBM: Redbook, 2007.
Ramachandran, J., Designing Security Architecture Solutions, J. Willey, Inc., 2002.
Zegzhda, D.P. and Stepanova, T.V., Large-scale systems security evolution: Control theory approach, Proceedings of the 7th International Conference on Security of Information and Networks, September 8–10, 2015, Sochi, 2015.
Zegzhda, P.D., Zegzhda, D.P., and Nikolskiy, A.V., Using graph theory for cloud system security modeling, Lect. Notes Comput. Sci., 2012, vol. 7531, pp. 309–318.
Unified Security Architecture for enterprise network security, Nortel Networks, 2002.
STO BR IBBR-1.0-2014: Providing Information Security of Organizations of the Banking System of the Russian Federation. General Provisions, Moscow: Bank Rossii, 2014.
Grusho, A.A., Primenko, E.A., and Timonina, E.E., Teoreticheskie osnovy komp’yuternoi bezopasnosti: Ucheb. posobie dlya studentov vyssh. ucheb. zavedenii (Theoretical Foundations of Computer Security: Textbook), Moscow: Izd. Tsentr Akademiya, 2009.
Grusho, A.A., Grusho, N.A., Levykin, M.V., and Timonina, E.E., Secure architectures of distributed information-computing systems based on complex virtualization, Probl. Inf. Bezop., Komp’yut. Sist., 2016, no. 4, pp. 31–35.
Grusho, A.A., Grusho, N.A., Timonina, E.E., and Shorgin, S.Ya., Possibilities for constructing a secure architecture for a dynamically changing information system, Sist. Sredstva Inf., 2015, vol. 25, no. 3, pp. 78–93.
McGeer, R., Verification of switching network properties using satisfiability, Proceedings of 2012 IEEE International Conference on Communications (ICC), Ottawa, 2012, pp. 6638–6644.
Grusho, A.A., Zabezhailo, M.I., Zatsarinnyi, A.A., and Piskovskii, V.O., Safe automatic reconfiguration of cloud computing environments, Sist. Sredstva Inf., 2016, vol. 26, no. 3, pp. 83–92.
Grusho, A.A. and Terekhina, I.Yu., Consistency analysis of reconfiguration of a software-configurable network, Sist. Sredstva Inf., 2017, vol. 27, no. 3, pp. 11–21.
Sandhu, R., Krishnan, R., Niu, J., and Winsborough, W.H., Group-centric models for secure and agile information sharing, Proc. of MMM-ACNS 2010, Kotenko, I. and Skormin, I., Eds., 2010, pp. 55–69.
Author information
Authors and Affiliations
Corresponding author
Additional information
Original Russian Text © A.A. Grusho, N.A. Grusho, E.E. Timonina, 2017, published in Problemy Informatsionnoi Bezopasnosti, Komp’yuternye Sistemy.
About this article
Cite this article
Grusho, A.A., Grusho, N.A. & Timonina, E.E. Information security architecture synthesis in distributed information computation systems. Aut. Control Comp. Sci. 51, 799–804 (2017). https://doi.org/10.3103/S0146411617080089
Received:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411617080089