Статья 'Один из подходов к моделированию маршрута распределения обработки критичных данных в гибридной среде облачных вычислений' - журнал 'Национальная безопасность / nota bene' - NotaBene.ru
по
Journal Menu
> Issues > Rubrics > About journal > Authors > About the Journal > Requirements for publication > Editorial board > Peer-review process > Policy of publication. Aims & Scope. > Article retraction > Ethics > Online First Pre-Publication > Copyright & Licensing Policy > Digital archiving policy > Open Access Policy > Article Processing Charge > Article Identification Policy > Plagiarism check policy > Editorial collegium
Journals in science databases
About the Journal

MAIN PAGE > Back to contents
National Security
Reference:

Tsaregorodtsev, A.V., Kachkov, A.K. One of the approaches to modeling the route for spread of analysis of critical data in the hybrid area of cloud computing.

Abstract: Use of cloud computing when forming the IT – infrastructure of the organization presupposes that the organization shall not control the aspects of security directly. There is need to guarantee conifdentiality of the data, when forming the architecture based on the cloud computing. The approach of modelling the data processing with the Petri nets in accordance with the requirements of the security policy of the organization allows to gain important information on the structure of multi-level system of access management in the hybrid cloud area. In the end it allows to follow dynamic behavior of processing critical data in the modelled system.


Keywords:

security models for the computer systems, cloud computing, public cloud, private cloud, hybrid cloud, security requirements, data confidentiality, modelling.


This article can be downloaded freely in PDF format for reading. Download article

This article written in Russian. You can find original text of the article here .
References
1. Piterson Dzh. Teoriya setey Petri i modelirovanie sistem. – M.:MIR, 1981. – 263 s.
2. National Institute of Standards and Technology (NIST) Def init ion of Cloud Computing, http://csrc.nist.gov/groups/SNS/ cloud-computing/
3. R.L. Trope, E.M. Power, V.I. Polley and B.C.Morley. «A Coherent Strategy for Data Security through Data Governance». IEEE Security & Privacy, vol. 5, no. 3, pp. 32-39, May/ Jun. 2007.
4. Bishop M. Computer Security: art and science. ISBN 0-201-44099-7. 2002. 1084 p.
5. R. Accorsi, C. Wonnemann. «Auditing Workflow Execution against Dataflow Policies» In Proc. BIS, 2010, pp. 207-217.
6. Bell, D. E. and LaPadula, L. J.: Secure Computer System: Unif ied Exposit ion and Mult ics Interpretation, Tech report ESD-TR-75-306, Mitre Corp, Bedford, Ma. (1976)
Link to this article

You can simply select and copy link from below text field.


Other our sites:
Official Website of NOTA BENE / Aurora Group s.r.o.