Abstract—
This work considers the possibility of recovering valuable information when an intruder knows the results of information conversion and conversion in the framework of some information technology. The forest-type model of processable information is built. Approaches to protecting valuable information are investigated.
Similar content being viewed by others
REFERENCES
Grusho, A.A., Timonina, E.E., and Shorgin, S.Ya., The hierarchical method of metadata generation for managing network connections, Inf. Primen., 2018, vol. 12, no. 2, pp. 44-49.
Grusho, A.A., Grusho, N.A., Timonina, E.E., and Shorgin, S.Ya., Secure architectures of distributed systems, Sist. Sredstva Inf., 2014, vol. 24, no. 3, pp. 18–31.
Grusho, A.A., Grusho, N.A., Timonina, E.E., and Shorgin, S.Ya., Possibilities for constructing a secure architecture for a dynamically changing information system, Sist. Sredstva Inf., 2015, vol. 25, no. 3, pp. 78–93.
Azevedo de Amorim, A., Collins, N., DeHon, A., Demange, D., Hriţcu, C., Pichardie, D., Pierce, B.C., Pollack, R., and Tolmach, A., A verified information-flow architecture, J. Comput. Secur., 2016. doi 10.3233/jcs-15784
Anshakov, O.M. and Fabrikantova, E.F., DSM-metod avtomaticheskogo porozhdeniya gipotez: Logicheskie i epistemologicheskie osnovanii (JSM-Method for Automatic Hypothesis Generation: Logical and Epistemological Grounds), Anshakov, O.M., Ed., Moscow: Knizhnyi dom LIBROKOM, 2009.
Church, A., Introduction to Mathematical Logic, Princeton University Press, 1996.
Ashby, W.R., Design for a Brain, Springer US, 1954.
Grusho, A., Grusho, N., and Timonina, E., Detection of anomalies in non-numerical data, Proceedings of the 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, Piscataway, NJ, 2016, pp. 273–276.
Piotrovskii, R.G., Tekst, mashina, chelovek (Text, Machine, Man), Leningrad: Nauka, 1975.
Shannon, C., Raboty po teorii informatsii i kibernetike (Works on Information Theory and Cybernetics), Moscow: Inostrannaya literatura, 1963.
ACKNOWLEDGMENTS
This work was partially supported by the Russian Foundation for Basic Research, project no. 18-07-00274-а.
Author information
Authors and Affiliations
Corresponding author
Additional information
Translated by S. Kuznetsov
About this article
Cite this article
Grusho, A.A., Grusho, N.A., Zabezhaylo, M.I. et al. Protection of Valuable Information in Information Technologies. Aut. Control Comp. Sci. 52, 1076–1079 (2018). https://doi.org/10.3103/S0146411618080138
Received:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411618080138