по
Journal Menu
> Issues > Rubrics > About journal > Authors > About the Journal > Requirements for publication > Council of Editors > List of peer reviewers > Review procedure > Policy of publication. Aims & Scope. > Article retraction > Ethics > Legal information
Journals in science databases
About the Journal

Публикация за 72 часа - теперь это реальность!
При необходимости издательство предоставляет авторам услугу сверхсрочной полноценной публикации. Уже через 72 часа статья появляется в числе опубликованных на сайте издательства с DOI и номерами страниц.
По первому требованию предоставляем все подтверждающие публикацию документы!
MAIN PAGE > Back to contents
The model of protection of multilevel communications
Lyapustin Anton

Post-graduate student, department of Design and Safety of Computer Systems

197101, Russia, Sankt-Peterburg, g. Sankt-Peerburg, Kronverkskii pr., 49, Universitet ITMO

Lyapustinae@gmail.com
Другие публикации этого автора
 

 
Kolesnikova Svetlana

Postgraduate Student, Department of Computer Security Systems Design, University of ITMO

197101, Russia, Saint Petersburg, g. Saint Petersburg, Kronverkskii pr., 49, Universitet ITMO

kolesnikovasy@corp.ifmo.ru
Другие публикации этого автора
 

 
Mel'nik Danil

Postgraduate Student, Department of Computer Security Systems Design, University of ITMO

191186, Russia, Saint Petersburg, g. Saint Petersburg, ul. Bol'shaya Morskaya, 24, of. 101

melnikdanil@gmail.com
Другие публикации этого автора
 

 

Abstract.

The work is devoted to the urgent problem of ensuring the security of heterogeneous information platforms, using the system of electronic support of on-line communications processes in a medical institution - e-health online communications. The authors pay special attention to such important aspects of the topic as: the security of heterogeneous information platforms, the model for the protection of heterogeneous information platforms, the classification of communications and the protection mechanisms of MMK. The tendencies for the development of new distributed safety models are considered. This article presents a model of multi-level communications. A classification of communications and protection mechanisms for each level with different security levels using cryptography protocols is proposed. Security flexibility can be provided to health organizations using a variety of key size combinations to protect data and channels. At each level, different levels of security can be provided depending on the sensitivity of the data. Thus, we came to the MMK model as a solution to the problem of communication in e-health and other large organizations with a distributed network of computer communications.

Keywords: protection mechanisms, heterogeneous information platforms, multilevel communications, intelligent protection system, threat detection, information security, analysis systems, detection algorithms, electronic communications, data protection

DOI:

10.25136/2306-4196.2018.3.26566

Article was received:

10-06-2018


Review date:

10-06-2018


Publish date:

22-06-2018


This article written in Russian. You can find full text of article in Russian here .

References
1.
Pfleeger C.P., Pfleeger S.L. Security in Computing. – Prentice Hall PTR, 2006.
2.
Guliev Ya.I., Tsvetkov A.A. Obespechenie informatsionnoi bezopasnosti v meditsinskikh organizatsiyakh. // Vrach i informatsionnye tekhnologii. – 2016.-№6.-S. 49-62.
3.
Gorbunov P.A., Fokht I.A. Problemy informatsionnoi bezopasnosti v meditsinskikh informatsionnykh sistemakh-teoreticheskie resheniya i prakticheskie razrabotki. // Tr. mezhdunar. konf. “Programmnye sistemy: teoriya i prilozheniya”.-IPS RAN, Pereslavl'-Zalesskii, 2006: V 2 t.-M.: Fizmatlit.-T. 1.-S. 107-112.
4.
Zashchita informatsii v meditsinskikh uchrezhdeniyakh. – http://www.elephus.ru/portfolio/med-zi/, 2017.
5.
Model' ugroz tipovoi meditsinskoi informatsionnoi sistemy (MIS) tipovogo lechebno profilakticheskogo uchrezhdeniya (LPU).-Minzdravsotsrazvitiya Rossii, 2009.
6.
Liederman E.M., et al. Systemwide rollout of doctor-patient secure web messaging: The university of california, davis, virtual care experience. /In: Whitten, P., Cook, D. (eds.) Understanding health communication technologies, 1st edn., pp. 244–250. A Wilery Imprint, San Francisco Jossey-Bass, 2004.
7.
Sulaiman R., et al. A Multi-agent Security Framework for e-Health Services. – In: 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007. Proceedings, Part II.-Springer-Verlag Berlin Heidelberg 2007. – P. 547–554.
8.
Sulaiman R. MAgSeM: A Multi-agent based Security Model for Secure Cyber Services.-PhD Thesis. University of Canberra: Faculty of Information Sciences and Engineering, 2010.
9.
Bleumer G. Security of decentralized health information systems //Journal of Biomedical Computing. – 1994. – P. 139-145.
10.
Rodriguez et. Al. Security requirement with a UML 2.0 profile.-/In: Proceedings of The First International Conference on Availability, Reliability and Security (ARES 2006). April 20-22, 2006. Vienna, Austria.
11.
Blobel J., Roger-France F. A systematic approach for analysis and design of secure helth information systems // International Journal of Medical Informatics. – 2001. – Vol. 62(1). – P. 51-78.
12.
Ametller J., et al. Self-Protected Mobile Agents /In: Proceeding AAMAS '04 Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems – Vol. 1.-New York.-July 19 – 23. 2004. – P. 362-367.
13.
Foner L.N. Yenta: a multi-agent, referral-based matchmaking system. /In: Proceedings of the Second International Conference on Multiagent Systems, 1996. – P. 436.
14.
Mehta M., et al. Security in E-Service and Application /In: Network Security: Current Status and Future Directions. – Wiley [Imprint], Inc., 2000.
15.
Ugurlu S., Erdogan N. SECMAP: A Sequre Mobile Agent Platform /In: CEEMAS 2005: Multi-Agent Systems and Applications IV. – P. 102-111.
16.
Privacy Act of 1974.-https://www.justice.gov/opcl/privacy-act-1974, 2015.
17.
Lenstra A.K. Key Lengths, Contribution to The Handbook of Information Security.-http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.694.8206, 2015.
18.
Blaze M., et al. Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security, 1996.
19.
CNSS Policy №15, Fact Sheet №1. National Policy on the Use of the AES to Protect National Security Information, 2003.
20.
Speciation for the Advanced Encryption Standard (AES): Federal Information Processing Standard Publication 197.-NIST, 2001.
21.
Yearly Report on Algorithms and Keysize (2007-2009).-www.economicexpert.com/a/Classified:information.htm, 2015.
22.
Arjen K.L., Eric R.V. Selecting Cryptographic Key Size // Journal Of Cryptology. – 2001.-Vol. 14.-P. 255-293.
23.
French B. Implementing SOA security.-Governance requirements for SOA security. – March 2006.
Link to this article

You can simply select and copy link from below text field.


Other our sites:
Official Website of NOTA BENE / Aurora Group s.r.o.
"History Illustrated" Website