Skip to main content
Log in

Protection of Valuable Information in Information Technologies

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract—

This work considers the possibility of recovering valuable information when an intruder knows the results of information conversion and conversion in the framework of some information technology. The forest-type model of processable information is built. Approaches to protecting valuable information are investigated.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

REFERENCES

  1. Grusho, A.A., Timonina, E.E., and Shorgin, S.Ya., The hierarchical method of metadata generation for managing network connections, Inf. Primen., 2018, vol. 12, no. 2, pp. 44-49.

    Google Scholar 

  2. Grusho, A.A., Grusho, N.A., Timonina, E.E., and Shorgin, S.Ya., Secure architectures of distributed systems, Sist. Sredstva Inf., 2014, vol. 24, no. 3, pp. 18–31.

    Google Scholar 

  3. Grusho, A.A., Grusho, N.A., Timonina, E.E., and Shorgin, S.Ya., Possibilities for constructing a secure architecture for a dynamically changing information system, Sist. Sredstva Inf., 2015, vol. 25, no. 3, pp. 78–93.

    Google Scholar 

  4. Azevedo de Amorim, A., Collins, N., DeHon, A., Demange, D., Hriţcu, C., Pichardie, D., Pierce, B.C., Pollack, R., and Tolmach, A., A verified information-flow architecture, J. Comput. Secur., 2016. doi 10.3233/jcs-15784

  5. Anshakov, O.M. and Fabrikantova, E.F., DSM-metod avtomaticheskogo porozhdeniya gipotez: Logicheskie i epistemologicheskie osnovanii (JSM-Method for Automatic Hypothesis Generation: Logical and Epistemological Grounds), Anshakov, O.M., Ed., Moscow: Knizhnyi dom LIBROKOM, 2009.

  6. Church, A., Introduction to Mathematical Logic, Princeton University Press, 1996.

    MATH  Google Scholar 

  7. Ashby, W.R., Design for a Brain, Springer US, 1954.

    Book  Google Scholar 

  8. Grusho, A., Grusho, N., and Timonina, E., Detection of anomalies in non-numerical data, Proceedings of the 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, Piscataway, NJ, 2016, pp. 273–276.

  9. Piotrovskii, R.G., Tekst, mashina, chelovek (Text, Machine, Man), Leningrad: Nauka, 1975.

  10. Shannon, C., Raboty po teorii informatsii i kibernetike (Works on Information Theory and Cybernetics), Moscow: Inostrannaya literatura, 1963.

Download references

ACKNOWLEDGMENTS

This work was partially supported by the Russian Foundation for Basic Research, project no. 18-07-00274-а.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. A. Grusho.

Additional information

Translated by S. Kuznetsov

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Grusho, A.A., Grusho, N.A., Zabezhaylo, M.I. et al. Protection of Valuable Information in Information Technologies. Aut. Control Comp. Sci. 52, 1076–1079 (2018). https://doi.org/10.3103/S0146411618080138

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411618080138

Keywords:

Navigation