Abstract
The usage of doubtful data for information protection is considered. It is shown that by means of unauthenticity it is possible to protect confidentiality, integrity and availability. The basic methods of usage of unauthenticity are mentioned. We introduce the mathematical models and present estimations of quality for information protection with help of injection of unreliable information.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Prokhorov, Y.V., Rozanov, Y.: A Probability theory: Science (1973) (in Russian)
Pieprzyk, J., Hardjono, T., Seberry, J.: Fundamentals of Computer Secyrity. Springer (2003)
Mikheenkova, M.A.: About principles of the formalized qualitative analysis of sociological data. J. Information Technologies and Computing Systems 4 (2009)
Grusho, A.A., Timonina, E.E.: Intellectual noise. J. Problems of Information Protection Computer Systems 1 (2000)
Grusho, A.A., Grusho, N.A., Timonina, E.E.: Some of application steganography and security of steganographic scemes. J. Problems of Information Protection Computer Systems 2 (2007)
Turmoils, G., Yakobson, A., Rambo, J.: UML. Classics CS. 2 izd./lanes with English: Under the general edition of prof. S. Orlova - SPb.: Peter (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Grusho, A., Grusho, N., Timonina, E. (2012). Alternative Mechanisms for Information Security. In: Kotenko, I., Skormin, V. (eds) Computer Network Security. MMM-ACNS 2012. Lecture Notes in Computer Science, vol 7531. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33704-8_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-33704-8_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33703-1
Online ISBN: 978-3-642-33704-8
eBook Packages: Computer ScienceComputer Science (R0)