ecms_neu_mini.png

Digital Library

of the European Council for Modelling and Simulation

 

Title:

Modelling For Ensuring Information Security Of The Distributed Information Systems

Authors:

Alexander A. Grusho, Elena E. Timonina, Sergey Shorgin

Published in:

 

 

 

(2017).ECMS 2017 Proceedings Edited by: Zita Zoltay Paprika, Péter Horák, Kata Váradi, Péter Tamás Zwierczyk, Ágnes Vidovics-Dancs, János Péter Rádics

European Council for Modeling and Simulation. doi:10.7148/2017

 

 

ISBN: 978-0-9932440-4-9/

ISBN: 978-0-9932440-5-6 (CD)

 

 

31st European Conference on Modelling and Simulation,

Budapest, Hungary, May 23rd – May 26th, 2017

 

Citation format:

Alexander A. Grusho, Elena E. Timonina, Sergey Shorgin (2017). Modelling For Ensuring Information Security Of The Distributed Information Systems, ECMS 2017 Proceedings Edited by: Zita Zoltay Paprika, Péter Horák, Kata Váradi, Péter Tamás Zwierczyk, Ágnes Vidovics-Dancs, János Péter Rádics European Council for Modeling and Simulation. doi: 10.7148/2017-0656

 

DOI:

https://doi.org/10.7148/2017-0656

Abstract:

In the paper the concept of the permitted interactions is defined, i.e. such interactions are necessary for the tasks which are legally started at present. Any other interactions are considered as forbidden.

The main objective is definition, what interactions are permitted during this period of time. For the solution of this problem it is offered to model the needs for interactions depending on existence of legally started tasks. Such modeling is possible on the basis of meta data about the used tasks and their information requirements.

The main idea of control is that the started task appeals to meta data for the permission of interaction with other task, necessary for her decision. On the basis of meta data a need of such interaction is defined and permission which can't be forged or bypassed is given.

 

Full text: