Protection of Valuable Information in Information Technologies


Cite item

Full Text

Open Access Open Access
Restricted Access Access granted
Restricted Access Subscription Access

Abstract

This work considers the possibility of recovering valuable information when an intruder knows the results of information conversion and conversion in the framework of some information technology. The forest-type model of processable information is built. Approaches to protecting valuable information are investigated.

About the authors

A. A. Grusho

Federal Research Center Computer Science and Control, Russian Academy of Sciences

Author for correspondence.
Email: grusho@yandex.ru
Russian Federation, Moscow, 119333

N. A. Grusho

Federal Research Center Computer Science and Control, Russian Academy of Sciences

Email: grusho@yandex.ru
Russian Federation, Moscow, 119333

M. I. Zabezhaylo

Federal Research Center Computer Science and Control, Russian Academy of Sciences

Email: grusho@yandex.ru
Russian Federation, Moscow, 119333

E. E. Timonina

Federal Research Center Computer Science and Control, Russian Academy of Sciences

Email: grusho@yandex.ru
Russian Federation, Moscow, 119333

Supplementary files

Supplementary Files
Action
1. JATS XML

Copyright (c) 2018 Allerton Press, Inc.