Discretional model and method of distributed information resources access control.
Keywords:
authentication, hashing, authentication factors, access control model, workstation featuresAbstract
The paper presents an analysis of access control models. The access control model, which, exploiting the hashing process peculiarities, allows to limit the number of workstations from which the user is allowed to get remote access to information resources, is proposed. The choice of authentication factors of a workstation and user has been substantiated, which allowed to develop the method that implements this access control model.
References
1. Luzhetskiy V. А. Fundamentals of information security : manual / V. А. Luzhetskiy,
А. D. Kozhukhivskiy, О. P. Voitovych. – Vinnytsia: VNTU, 2013. – 221 p. (Ukr).
2. Maliuk А. А. Information security:conceptual and metrological fundamentals of information security : manual /
А. А. Maliuk. – М. : Hot line-Теlecom, 2004. – 280 p. (Rus).
3. Devianin P. N. Models of computer systems security / P. N. Devianin. – М. : Publishing centre "Academy", 2005. – 144 p. (Rus).
4. Authentification. Theory and practice of safe access provision to information resources. Manual for graduate students / [А. А. Afanasiev, L. Т. Vedeniev, А. А. Vorontsov et al.] ;Under the editorship of А. А. Shelupanov,
S. L. Gruzdev, Yu. S. Nakhaev. – М. : Hot line-Теlеcоm, 2009. – 552 p. (Rus).
5. Tsirlov V. L. Fundamentals of information security of automated control systems. Concise course / V. L. Tsirlov. – М. : Phoenix Publishing House, 2008. – 174 p. (Rus).
6. Mironova V. G. Take-Grant model realization as the presentation of access rights differentiation systems in the premises / V. G. Mironova, А. А. Shelupanov, N. Т. Yugov // Reports of ТУСУР. – 2011. – № 2 (24). –
P. 206 – 210. (Rus).
7. Theory and practice of information security provision / [Under the editorship of P. D. Zegzhdy]. – М : Yachtsman, 1996. – 302 p. (Rus).
8. Zhora V. V. Approach to modeling of role-based security policy / V. V. Zhora // Legal, normative and metrological provision of information security systems in Ukraine : internet journal. – 2003. – № 7. – P. 45 – 49. (Ukr).
9. Panasenko S. Methods of authentification / S. Panasenko // Banks and technologies. – 2002 – № 3. – P. 56 – 60. (Rus).
10. Baryshev Yu. V. Methods of authentification of remote users for networking services / Yu. V. Baryshev,
V. А. Каplun // Information technologies and computer engineering. – 2014. – № 2. – P. 13 – 17. (Ukr).
11. Baryshev Yu. V. Method of remote users authorization / Yu. V. Baryshev, К. V. Neuimina // Abstracts of the Fifth International Scientific Practical Conference "Methods and means of coding, protection and compression of information" Vinnytsia, 19-21 april 2016. – Vinnytsia : VNTU, 2016. – P. 65 – 67. (Ukr).
12. Baryshev Yu. V. Method and means of file server users authentification / Yu. V. Baryshev,
К. І. Кryveshko // Proceedings of IV International Scientific Practical Conference "Processing of signals and non-Gaussion processes", dedicated to the memory of Professor Yu. P. Kunchenko : Abstracts. – Cherkasy : CSTU, 2013. – P. 109 – 111. (Ukr).
13. Biham E. A Framework for Iterative Hash Functions: HAIFA [Electronic resource] / Eli Biham, Orr Dunkelman // Second cryptographic hash workshop. – 2006. – 9 c. – Access mode to the resource : http://csrc.nist.gov/groups/ST/hash/documents/DUNKELMAN_NIST3.pdf.
14. Baryshev Yu. V. Methods and means of rapid multichannel data hashing in computer systems. Author’s abstract of Сandidate of Science (Engineering) Dissertation on specialty 05.13.05 «Computer systems and components» /
Yu. V. Baryshev. – Vinnytsia : VNTU, 2012. – 20 p. (Ukr).
15. Dudatiev А. V. Software security. Part 1. Manual / А. V. Dudatiev, V. А. Каplun, S. P. Semerenko. – Vinnytsia : VNTU, 2005. – 140 p. (Ukr).
А. D. Kozhukhivskiy, О. P. Voitovych. – Vinnytsia: VNTU, 2013. – 221 p. (Ukr).
2. Maliuk А. А. Information security:conceptual and metrological fundamentals of information security : manual /
А. А. Maliuk. – М. : Hot line-Теlecom, 2004. – 280 p. (Rus).
3. Devianin P. N. Models of computer systems security / P. N. Devianin. – М. : Publishing centre "Academy", 2005. – 144 p. (Rus).
4. Authentification. Theory and practice of safe access provision to information resources. Manual for graduate students / [А. А. Afanasiev, L. Т. Vedeniev, А. А. Vorontsov et al.] ;Under the editorship of А. А. Shelupanov,
S. L. Gruzdev, Yu. S. Nakhaev. – М. : Hot line-Теlеcоm, 2009. – 552 p. (Rus).
5. Tsirlov V. L. Fundamentals of information security of automated control systems. Concise course / V. L. Tsirlov. – М. : Phoenix Publishing House, 2008. – 174 p. (Rus).
6. Mironova V. G. Take-Grant model realization as the presentation of access rights differentiation systems in the premises / V. G. Mironova, А. А. Shelupanov, N. Т. Yugov // Reports of ТУСУР. – 2011. – № 2 (24). –
P. 206 – 210. (Rus).
7. Theory and practice of information security provision / [Under the editorship of P. D. Zegzhdy]. – М : Yachtsman, 1996. – 302 p. (Rus).
8. Zhora V. V. Approach to modeling of role-based security policy / V. V. Zhora // Legal, normative and metrological provision of information security systems in Ukraine : internet journal. – 2003. – № 7. – P. 45 – 49. (Ukr).
9. Panasenko S. Methods of authentification / S. Panasenko // Banks and technologies. – 2002 – № 3. – P. 56 – 60. (Rus).
10. Baryshev Yu. V. Methods of authentification of remote users for networking services / Yu. V. Baryshev,
V. А. Каplun // Information technologies and computer engineering. – 2014. – № 2. – P. 13 – 17. (Ukr).
11. Baryshev Yu. V. Method of remote users authorization / Yu. V. Baryshev, К. V. Neuimina // Abstracts of the Fifth International Scientific Practical Conference "Methods and means of coding, protection and compression of information" Vinnytsia, 19-21 april 2016. – Vinnytsia : VNTU, 2016. – P. 65 – 67. (Ukr).
12. Baryshev Yu. V. Method and means of file server users authentification / Yu. V. Baryshev,
К. І. Кryveshko // Proceedings of IV International Scientific Practical Conference "Processing of signals and non-Gaussion processes", dedicated to the memory of Professor Yu. P. Kunchenko : Abstracts. – Cherkasy : CSTU, 2013. – P. 109 – 111. (Ukr).
13. Biham E. A Framework for Iterative Hash Functions: HAIFA [Electronic resource] / Eli Biham, Orr Dunkelman // Second cryptographic hash workshop. – 2006. – 9 c. – Access mode to the resource : http://csrc.nist.gov/groups/ST/hash/documents/DUNKELMAN_NIST3.pdf.
14. Baryshev Yu. V. Methods and means of rapid multichannel data hashing in computer systems. Author’s abstract of Сandidate of Science (Engineering) Dissertation on specialty 05.13.05 «Computer systems and components» /
Yu. V. Baryshev. – Vinnytsia : VNTU, 2012. – 20 p. (Ukr).
15. Dudatiev А. V. Software security. Part 1. Manual / А. V. Dudatiev, V. А. Каplun, S. P. Semerenko. – Vinnytsia : VNTU, 2005. – 140 p. (Ukr).
Downloads
-
PDF
Downloads: 122
Abstract views: 185
Published
2017-06-22
How to Cite
[1]
Y. Baryshev, V. Kaplun, and K. Neiyumina, “Discretional model and method of distributed information resources access control”., Works of VNTU, no. 2, Jun. 2017.
Issue
Section
Information Technologies and Computer Engineering