Adaptive security in complex information systems

被引:0
|
作者
Shnitko, A [1 ]
机构
[1] Novosibirsk State Univ, Novosibirsk 630092, Russia
关键词
information security; security models; adaptive security; complex information systems;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Modern information security standards include such obligatory requirements for secure systems as self-testing, fault-tolerance and active audit. However most of traditional security models were developed without taking into consideration possibility of presence of dynamic elements. This paper is devoted to the description of the approach to design of complex secure systems which is based on the formalization of adaptive functions in information security context. Both practical and theoretical aspects related to the usage of adaptive security in complex systems are highlighted. Integral approach to the problem of usage of adaptive functions for the aims of security is suggested. Issues related to the correspondence of adaptive technologies to recent requirements on the design and implementation of secure information systems were also discussed.
引用
收藏
页码:206 / 210
页数:5
相关论文
共 50 条
  • [1] A new information processing measure for adaptive complex systems
    Sánchez-Montañés, MA
    Corbacho, FJ
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS, 2004, 15 (04): : 917 - 927
  • [2] Transients as the Basis for Information Flow in Complex Adaptive Systems
    Sulis, William
    [J]. ENTROPY, 2019, 21 (01):
  • [3] Adaptive Information Security and Privacy
    Nuseibeh, Bashar
    [J]. 2017 11TH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), 2017, : 17 - 17
  • [4] Information systems security in the information systems curriculum
    Eastman, C
    Farkas, C
    [J]. INFORMATION TECHNOLOGY AND ORGANIZATIONS: TRENDS, ISSUES, CHALLENGES AND SOLUTIONS, VOLS 1 AND 2, 2003, : 117 - 118
  • [6] Application of complex adaptive systems to pricing of reproducible information goods
    Khouja, Moutaz
    Hadzikadic, Mirsad
    Rajagopalan, Hari K.
    Tsay, Li-Shiang
    [J]. DECISION SUPPORT SYSTEMS, 2008, 44 (03) : 725 - 739
  • [7] Security of information in IT systems
    Kaliczynska, M
    [J]. Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments III, 2005, 5775 : 571 - 576
  • [8] ICT Crime Cases Autopsy: Using the Adaptive Information Security Systems Model to Improve ICT Security
    Mwakalinga, Jeffy
    Kowalski, Stewart
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (03): : 114 - 123
  • [9] Information Monitoring and Adaptive Information Fusion of Multisource Fusion Navigation Systems in Complex Environments
    Zhao, Huijun
    Liu, Jun
    Chen, Xuemei
    Cao, Huiliang
    Wang, Chenguang
    Li, Jie
    Shen, Chong
    Tang, Jun
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (14): : 25047 - 25056
  • [10] Information systems resources and information security
    Chang, Kuo-chung
    Wang, Chih-ping
    [J]. INFORMATION SYSTEMS FRONTIERS, 2011, 13 (04) : 579 - 593