Multilevel model of information protection the at use of means of cryptographic protection

被引:0
|
作者
Kozub, AA [1 ]
Mescheriakov, RV [1 ]
Kiseleva, I [1 ]
机构
[1] Tomsk State Univ Control Syst & Radioelect, Tomsk, Russia
来源
2003 SIBERIAN RUSSIAN WORKSHOP ON ELECTRON DEVICES AND MATERIALS PROCEEDINGS | 2003年
关键词
algorithm; cryptography; deciphering; enciphering; information; model; protection; security; system;
D O I
10.1109/SREDM.2003.1224207
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the article the multilevel model of protection of the information is represented. Use of a complex of estimations is offered at use of means of cryptographic protection of the information. Differential the information on levels of confidentiality of information resources is divided. Integrated the complex estimation is offered.
引用
收藏
页码:139 / 140
页数:2
相关论文
共 50 条
  • [1] Agent Protection based on the use of cryptographic hardware
    Munoz, Antonio
    Mana, Antonio
    Harjani, Rajesh
    Montenegro, Marioli
    2009 IEEE 33RD INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOLS 1 AND 2, 2009, : 985 - 990
  • [2] Improved Cryptographic Protection of Information using Robust Authentication Algorithms
    Zivic, Natasa
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INTEGRATED INFORMATION (IC-ININFO 2012), 2013, 73 : 62 - 67
  • [3] Improved Cryptographic Protection of Information using Robust Authentication Algorithms
    Zivic, Natasa
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INTEGRATED INFORMATION (IC-ININFO 2012), 2013, 73 : 51 - 56
  • [4] Information System's Protection Algorithms, Comparative Analyses
    Al Zu'bi, Omar Radhi
    Ibrahim, Yasir Khalil
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (12): : 294 - 299
  • [5] Protection survivability importance in systems with multilevel protection
    Levitin, G
    QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL, 2004, 20 (08) : 727 - 738
  • [6] Secure Physical Access Control with Strong Cryptographic Protection
    Hajny, Jan
    Dzurenda, Petr
    Malina, Lukas
    2015 12TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (ICETE), VOL 4, 2015, : 220 - 227
  • [7] Cryptographic Protection for Military Radio Communications
    Bialas, Robert
    Grzonkowski, Marcin
    Wicik, Robert
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2020, 66 (04) : 687 - 693
  • [8] The security and protection technology research of computer information
    Liu, Yu
    Zhou, Jing
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS (MEITA 2016), 2017, 107 : 90 - 94
  • [9] A cryptographic model for better information security
    Kumar, Sunil
    Kumar, Manish
    Budhiraja, Rajat
    Das, M. K.
    Singh, Sanjeev
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 43 : 123 - 138
  • [10] Cryptographic algorithm for protection of communication in drones control
    Ivanov I.
    Andreev K.
    Vetova S.
    Arnaudov R.
    International Journal of Reasoning-based Intelligent Systems, 2021, 13 (01) : 32 - 38