z-logo
open-access-imgOpen Access
Methodical approach to reducing the dimensionality of the task of requirements substantiation for protection of information systems against unauthorized access in organizational-technical systems
Author(s) -
T. V. Meshcheryakova,
O. A. Gulyaev,
A. A. Abdullin,
A. V. Batskikh
Publication year - 2020
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1479/1/012013
Subject(s) - computer science , cluster analysis , task (project management) , information system , architecture , curse of dimensionality , graph , adjacency matrix , risk analysis (engineering) , software engineering , systems engineering , theoretical computer science , artificial intelligence , engineering , medicine , art , electrical engineering , visual arts
The article proposes a methodological approach to reducing the dimensionality of the problem of forming the requirements for the security of information processed in organizational-technical systems with complex architecture. The methodological approach is based on the structural analysis of graphs that formalize the structural scheme of organizational-technical systems and on the construction of the adjacency matrix of the graph. Using the selected elements of strong connectiveness, which form the clusters of architecture, allows further to solve the problem of formation of requirements to the information protection system against unauthorized access and to go from the architecture of organizational-technical system as a whole to the consideration of individual clusters. In this case, the task of forming requirements is significantly simplified. With the use of the proposed method of clustering the architecture of organizational-technical systems, the problem of forming the sets of information protection of objects of biological activity during molecular-biological and genetic - engineering studies is solved.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here