RUS  ENG
Full version
JOURNALS // Sistemy i Sredstva Informatiki [Systems and Means of Informatics] // Archive

Sistemy i Sredstva Inform., 2016 Volume 26, Issue 4, Pages 31–37 (Mi ssi487)

This article is cited in 2 papers

Security evaluation in secure architecture of distributed information systems

A. A. Grusho, N. A. Grusho, E. E. Timonina

Institute of Informatics Problems, Federal Research Center "Computer Science and Control" of the Russian Academy of Sciences, 44-2 Vavilov Str., Moscow 119333, Russian Federation

Abstract: The necessary condition of secure architecture of distributed information systems is the possibility of effective enumerating of information flows and the analysis of their contents. Completeness of the analysis of security of distributed information systems comes down to completeness of enumerating of information flows and possibility of the analysis of their contents. Contradictions of secure architecture of distributed information systems can arise if there is a forbidden information flow, or a ban on an allowed information flow, or an admission of failure is possible. The paper gives an example of architecture of distributed information systems in which the analysis of interactions of components represents a complex computing problem and an example of secure architecture when it is possible to effectively analyze all interactions in distributed information systems.

Keywords: secure architecture of distributed information systems; methods of the analysis of security of distributed information systems.

Received: 13.09.2016

DOI: 10.14357/08696527160403



Bibliographic databases:


© Steklov Math. Inst. of RAS, 2026