Automatic Control and Computer Sciences

, Volume 51, Issue 8, pp 799–804 | Cite as

Information security architecture synthesis in distributed information computation systems

  • A. A. Grusho
  • N. A. Grusho
  • E. E. Timonina


This work considers the task of synthesizing information security architecture in the distributed information computation systems. The synthesis has been based on elementary structures described in the form of diagrams of solving action protection problems in the process of computation in the computer system and during network exchange.


information security secure architecture synthesis distributed information computation systems 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    GOST (State Standard) R ISO/MEK 15408-1-2012: Information Technology. Methods and Means of Ensuring Security. Criteria for Assessing the Security of Information Technology. Part 1. Introduction and the General Model, 2014.Google Scholar
  2. 2.
    GOST (State Standard) R ISO/MEK 15408-2-2013: Information Technology. Methods and Means of Ensuring Security. Criteria for Assessing the Security of Information Technology. Part 2. Functional Safety Requirements, 2014.Google Scholar
  3. 3.
    GOST (State Standard) R ISO/MEK 15408-3-2013: Information Technology. Methods and Means of Ensuring Security. Criteria for Assessing the Security of Information Technology. Part 3. Components of Confidence in Security, 2014.Google Scholar
  4. 4.
    Buecker, A., Carreno, A.V., Field, N., Hockings, C., Kawer, D., Mohanty, S., and Monteiro, S., Enterprise Security Architecture Using IBM Tivoli Security Solutions, IBM: Redbook, 2007.Google Scholar
  5. 5.
    Ramachandran, J., Designing Security Architecture Solutions, J. Willey, Inc., 2002.Google Scholar
  6. 6.
    Zegzhda, D.P. and Stepanova, T.V., Large-scale systems security evolution: Control theory approach, Proceedings of the 7th International Conference on Security of Information and Networks, September 8–10, 2015, Sochi, 2015.Google Scholar
  7. 7.
    Zegzhda, P.D., Zegzhda, D.P., and Nikolskiy, A.V., Using graph theory for cloud system security modeling, Lect. Notes Comput. Sci., 2012, vol. 7531, pp. 309–318.CrossRefGoogle Scholar
  8. 8.
    Unified Security Architecture for enterprise network security, Nortel Networks, 2002.Google Scholar
  9. 9.
    STO BR IBBR-1.0-2014: Providing Information Security of Organizations of the Banking System of the Russian Federation. General Provisions, Moscow: Bank Rossii, 2014.Google Scholar
  10. 10.
    Grusho, A.A., Primenko, E.A., and Timonina, E.E., Teoreticheskie osnovy komp’yuternoi bezopasnosti: Ucheb. posobie dlya studentov vyssh. ucheb. zavedenii (Theoretical Foundations of Computer Security: Textbook), Moscow: Izd. Tsentr Akademiya, 2009.Google Scholar
  11. 11.
    Grusho, A.A., Grusho, N.A., Levykin, M.V., and Timonina, E.E., Secure architectures of distributed information-computing systems based on complex virtualization, Probl. Inf. Bezop., Komp’yut. Sist., 2016, no. 4, pp. 31–35.Google Scholar
  12. 12.
    Grusho, A.A., Grusho, N.A., Timonina, E.E., and Shorgin, S.Ya., Possibilities for constructing a secure architecture for a dynamically changing information system, Sist. Sredstva Inf., 2015, vol. 25, no. 3, pp. 78–93.Google Scholar
  13. 13.
    McGeer, R., Verification of switching network properties using satisfiability, Proceedings of 2012 IEEE International Conference on Communications (ICC), Ottawa, 2012, pp. 6638–6644.CrossRefGoogle Scholar
  14. 14.
    Grusho, A.A., Zabezhailo, M.I., Zatsarinnyi, A.A., and Piskovskii, V.O., Safe automatic reconfiguration of cloud computing environments, Sist. Sredstva Inf., 2016, vol. 26, no. 3, pp. 83–92.Google Scholar
  15. 15.
    Grusho, A.A. and Terekhina, I.Yu., Consistency analysis of reconfiguration of a software-configurable network, Sist. Sredstva Inf., 2017, vol. 27, no. 3, pp. 11–21.Google Scholar
  16. 16.
    Sandhu, R., Krishnan, R., Niu, J., and Winsborough, W.H., Group-centric models for secure and agile information sharing, Proc. of MMM-ACNS 2010, Kotenko, I. and Skormin, I., Eds., 2010, pp. 55–69.Google Scholar

Copyright information

© Allerton Press, Inc. 2017

Authors and Affiliations

  1. 1.Federal Research Center Computer Science and ControlRussian Academy of SciencesMoscowRussia

Personalised recommendations