Protection of Valuable Information in Information Technologies
- Authors: Grusho A.A.1, Grusho N.A.1, Zabezhaylo M.I.1, Timonina E.E.1
-
Affiliations:
- Federal Research Center Computer Science and Control, Russian Academy of Sciences
- Issue: Vol 52, No 8 (2018)
- Pages: 1076-1079
- Section: Article
- URL: https://journals.rcsi.science/0146-4116/article/view/175725
- DOI: https://doi.org/10.3103/S0146411618080138
- ID: 175725
Cite item
Abstract
This work considers the possibility of recovering valuable information when an intruder knows the results of information conversion and conversion in the framework of some information technology. The forest-type model of processable information is built. Approaches to protecting valuable information are investigated.
About the authors
A. A. Grusho
Federal Research Center Computer Science and Control, Russian Academy of Sciences
Author for correspondence.
Email: grusho@yandex.ru
Russian Federation, Moscow, 119333
N. A. Grusho
Federal Research Center Computer Science and Control, Russian Academy of Sciences
Email: grusho@yandex.ru
Russian Federation, Moscow, 119333
M. I. Zabezhaylo
Federal Research Center Computer Science and Control, Russian Academy of Sciences
Email: grusho@yandex.ru
Russian Federation, Moscow, 119333
E. E. Timonina
Federal Research Center Computer Science and Control, Russian Academy of Sciences
Email: grusho@yandex.ru
Russian Federation, Moscow, 119333
Supplementary files
