Multilevel model of information protection the at use of means of cryptographic protection

被引:0
|
作者
Kozub, AA [1 ]
Mescheriakov, RV [1 ]
Kiseleva, I [1 ]
机构
[1] Tomsk State Univ Control Syst & Radioelect, Tomsk, Russia
来源
2003 SIBERIAN RUSSIAN WORKSHOP ON ELECTRON DEVICES AND MATERIALS PROCEEDINGS | 2003年
关键词
algorithm; cryptography; deciphering; enciphering; information; model; protection; security; system;
D O I
10.1109/SREDM.2003.1224207
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the article the multilevel model of protection of the information is represented. Use of a complex of estimations is offered at use of means of cryptographic protection of the information. Differential the information on levels of confidentiality of information resources is divided. Integrated the complex estimation is offered.
引用
收藏
页码:139 / 140
页数:2
相关论文
共 50 条
  • [31] MID-Crypt: A Cryptographic Algorithm for Advanced Medical Images Protection
    Ahmad, Ashraf
    AbuHour, Yousef
    Younisse, Remah
    Alslman, Yasmeen
    Alnagi, Eman
    Abu Al-Haija, Qasem
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2022, 11 (02)
  • [32] The security and protection strategy research of computer network information
    Liu, Yu
    Chang, Jing
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS (MEITA 2016), 2017, 107 : 95 - 99
  • [33] Seamless Classified Information Protection Capability
    Ganapathy, Subhashini
    Amirfathi, Michael
    Layton, Ken
    Saadia, Acosta
    PROCEEDINGS OF THE 12TH WSEAS INTERNATIONAL CONFERENCE ON COMPUTERS , PTS 1-3: NEW ASPECTS OF COMPUTERS, 2008, : 712 - +
  • [34] Information Integrity and Its Protection in Networks
    Lei, Wu
    Ting, Song Xiao
    CEEM: 2009 5TH ASIA-PACIFIC CONFERENCE ON ENVIRONMENTAL ELECTROMAGNETICS, 2009, : 238 - 241
  • [35] Data Protection On Cloud Using GWOA Model
    Sinkar, Yogita Deepak
    Rajabhushanam, C.
    2021 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2021,
  • [36] Cryptography and Information Protection in the Living World
    Nagy, Naya
    Nagy, Marius
    Hodor, Paul
    INTERNATIONAL JOURNAL OF UNCONVENTIONAL COMPUTING, 2016, 12 (2-3) : 133 - 143
  • [37] Legal Protection of Digital Information in the era of Information Warfare
    Skorzewska-Amberg, Malgorzata
    PROCEEDINGS OF THE 10TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2011, : 237 - 244
  • [38] Application of Neural Network Technologies for Information Protection in Real Time
    Khavalko, Viktor
    Khudyy, Andrew
    2018 IEEE FIRST INTERNATIONAL CONFERENCE ON SYSTEM ANALYSIS & INTELLIGENT COMPUTING (SAIC), 2018, : 173 - 176
  • [39] Protection of Information Sovereignty as an Important Component of the Political Function of the State
    Zadorozhnia, Halyna
    Mykhtunenko, Viktoriia
    Kovalenko, Hanna
    Kuryliuk, Yurii
    Yurchenko, Liubov
    Maslennykova, Tetiana
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (09): : 151 - 154
  • [40] Organization of the user system for protection of information on a hard magnetic disk
    Tipikin, A.P., 1600, Begell House Inc. (71): : 953 - 959