Adaptive Management of Processes of Protection of the Information from
the Non-Authorized Access in Computing Systems.
Nikolay Eroslaev: Adaptive Management of Processes
of Protection of the Information from the Non-Authorized Access in Computing
Systems
CSIT 1999
: E/E
Abstract
The initial basis for management of protection is served the plans of processing
of the information in CS, and on the basis of the analysis to subject processing
of the information the requirements to protection of the information are
proved which can be expressed by a required parameter of security. The
optimum decision of a difficult problem of a safety of the information
now is possible only at the complex approach with use both organizational,
and technical measures of protection. The stated above material can be
used at the decision of a difficult task of a choice of the appropriate
measures and means of protection at functioning CS.
Copyright © 1999 by the Institute for Contemporary
Education "JurInfoR-MSU". Permission to copy without fee all or part of
this material is granted provided that the copies are not made or distributed
for direct commercial advantage, the CSIT copyright notice and the title
of the publication and its date appear, and notice is given that copying
is by permission of the Institute for Contemporary Education JMSUICE. To
copy otherwise, or to republish, requires a fee and/or special permission
from the JMSUICE.
Printed Edition
Ch. Freytag and V. Wolfengagen (Eds.): CSIT'99, Proceedings of 1st International
Workshop on Computer Science and Information Technologies, January 18-22,
1999, Moscow, Russia. MEPhI Publishing 1999, ISBN 5-7262-0263-5
Electronic Edition
-
From CS Dept., JurInfoR-MSU (Russia)
-
Postscript file, via HTTP
-
Postscript file, via FTP
-
PDF file, via HTTP
-
PDF file, via FTP
-
Sources, via HTTP
-
Sources, via FTP
CSIT Proceedings: Copyright © by JurInfoR-MSU
ICE,
Copyright © by Konstantin Zinchenko (kz@msu.jurinfor.ru),
last change: Sat Nov 28 1:18:35 1998