Multilevel model of information protection the at use of means of cryptographic protection

被引:0
|
作者
Kozub, AA [1 ]
Mescheriakov, RV [1 ]
Kiseleva, I [1 ]
机构
[1] Tomsk State Univ Control Syst & Radioelect, Tomsk, Russia
来源
2003 SIBERIAN RUSSIAN WORKSHOP ON ELECTRON DEVICES AND MATERIALS PROCEEDINGS | 2003年
关键词
algorithm; cryptography; deciphering; enciphering; information; model; protection; security; system;
D O I
10.1109/SREDM.2003.1224207
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the article the multilevel model of protection of the information is represented. Use of a complex of estimations is offered at use of means of cryptographic protection of the information. Differential the information on levels of confidentiality of information resources is divided. Integrated the complex estimation is offered.
引用
收藏
页码:139 / 140
页数:2
相关论文
共 50 条
  • [21] The Security and Privacy Protection of Hospital Information System
    Wang, Na
    Wang, Jin-guo
    3RD INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE AND DEVELOPMENT (ICSSD 2017), 2017, : 212 - 214
  • [22] Modular Multilevel Converter DC Fault Protection
    Cwikowski, O.
    Wickramasinghe, H. R.
    Konstantinou, G.
    Pou, J.
    Barnes, M.
    Shuttleworth, R.
    IEEE TRANSACTIONS ON POWER DELIVERY, 2018, 33 (01) : 291 - 300
  • [23] Comparing the protection and use of online personal information in South Africa and the United Kingdom in line with data protection requirements
    Da Veiga, Adele
    Vorster, Ruthea
    Li, Fudong
    Clarke, Nathan
    Furnell, Steven M.
    INFORMATION AND COMPUTER SECURITY, 2020, 28 (03) : 399 - 422
  • [24] Protection of AC motors by means of microcontrollers
    Çunkas, M
    Akkaya, R
    Öztürk, A
    MELECON 2000: INFORMATION TECHNOLOGY AND ELECTROTECHNOLOGY FOR THE MEDITERRANEAN COUNTRIES, VOLS 1-3, PROCEEDINGS, 2000, : 1093 - 1096
  • [25] Use of the information and documentation funds for the quality enhancement and the results protection of R&D activity
    Rene, K
    Zlata, S
    CURRENT STUDIES OF BIOTECHNOLOGY, VOL 1: BIOMEDICINE, 2000, : 109 - 112
  • [26] African American Internet Use for Information Search and Privacy Protection Tasks
    Park, Yong Jin
    Jang, S. Mo
    SOCIAL SCIENCE COMPUTER REVIEW, 2016, 34 (05) : 618 - 630
  • [27] THE CRYPTOGRAPHY AND THE PROTECTION OF DIGITAL INFORMATION
    Pabon Cadavid, Jhonny Antonio
    REVISTA LA PROPIEDAD INMATERIAL, 2010, (14): : 59 - +
  • [28] QoP-ML: Quality of protection modelling language for cryptographic protocols
    Ksiezopolski, Bogdan
    COMPUTERS & SECURITY, 2012, 31 (04) : 569 - 596
  • [29] A Cryptographic SoC for Robust Protection of Secret Keys in IPTV DRM Systems
    Lee, Sanghan
    Yang, Hae-Yong
    Yeom, Yongjin
    Park, Jongsik
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (01) : 194 - 201
  • [30] A Study on Read-Write Protection of a Digital Document by Cryptographic Techniques
    Hatano, Yasuo
    Miyazaki, Kunihiko
    Kaneko, Toshinobu
    2009 IEEE 6TH INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS (MASS 2009), 2009, : 945 - 952