Discretional model and method of distributed information resources access control.

Authors

  • Yurii Baryshev Vinnytsia National Technical University
  • Valentyna Kaplun Vinnytsia National Technical University
  • Krystyna Neiyumina Vinnytsia National Technical University

Keywords:

authentication, hashing, authentication factors, access control model, workstation features

Abstract

The paper presents an analysis of access control models. The access control model, which, exploiting the hashing process peculiarities, allows to limit the number of workstations from which the user is allowed to get remote access to information resources, is proposed. The choice of authentication factors of a workstation and user has been substantiated, which allowed to develop the method that implements this access control model.

Author Biographies

Yurii Baryshev, Vinnytsia National Technical University

Cand. Sc. (Eng.), Assist. Prof. with the Depatment of Informatin Protection

Valentyna Kaplun, Vinnytsia National Technical University

Senior Lecturer with the Department of Information Protection

Krystyna Neiyumina, Vinnytsia National Technical University

Student with the Department of Information Protection

References

1. Luzhetskiy V. А. Fundamentals of information security : manual / V. А. Luzhetskiy,
А. D. Kozhukhivskiy, О. P. Voitovych. – Vinnytsia: VNTU, 2013. – 221 p. (Ukr).
2. Maliuk А. А. Information security:conceptual and metrological fundamentals of information security : manual /
А. А. Maliuk. – М. : Hot line-Теlecom, 2004. – 280 p. (Rus).
3. Devianin P. N. Models of computer systems security / P. N. Devianin. – М. : Publishing centre "Academy", 2005. – 144 p. (Rus).
4. Authentification. Theory and practice of safe access provision to information resources. Manual for graduate students / [А. А. Afanasiev, L. Т. Vedeniev, А. А. Vorontsov et al.] ;Under the editorship of А. А. Shelupanov,
S. L. Gruzdev, Yu. S. Nakhaev. – М. : Hot line-Теlеcоm, 2009. – 552 p. (Rus).
5. Tsirlov V. L. Fundamentals of information security of automated control systems. Concise course / V. L. Tsirlov. – М. : Phoenix Publishing House, 2008. – 174 p. (Rus).
6. Mironova V. G. Take-Grant model realization as the presentation of access rights differentiation systems in the premises / V. G. Mironova, А. А. Shelupanov, N. Т. Yugov // Reports of ТУСУР. – 2011. – № 2 (24). –
P. 206 – 210. (Rus).
7. Theory and practice of information security provision / [Under the editorship of P. D. Zegzhdy]. – М : Yachtsman, 1996. – 302 p. (Rus).
8. Zhora V. V. Approach to modeling of role-based security policy / V. V. Zhora // Legal, normative and metrological provision of information security systems in Ukraine : internet journal. – 2003. – № 7. – P. 45 – 49. (Ukr).
9. Panasenko S. Methods of authentification / S. Panasenko // Banks and technologies. – 2002 – № 3. – P. 56 – 60. (Rus).
10. Baryshev Yu. V. Methods of authentification of remote users for networking services / Yu. V. Baryshev,
V. А. Каplun // Information technologies and computer engineering. – 2014. – № 2. – P. 13 – 17. (Ukr).
11. Baryshev Yu. V. Method of remote users authorization / Yu. V. Baryshev, К. V. Neuimina // Abstracts of the Fifth International Scientific Practical Conference "Methods and means of coding, protection and compression of information" Vinnytsia, 19-21 april 2016. – Vinnytsia : VNTU, 2016. – P. 65 – 67. (Ukr).
12. Baryshev Yu. V. Method and means of file server users authentification / Yu. V. Baryshev,
К. І. Кryveshko // Proceedings of IV International Scientific Practical Conference "Processing of signals and non-Gaussion processes", dedicated to the memory of Professor Yu. P. Kunchenko : Abstracts. – Cherkasy : CSTU, 2013. – P. 109 – 111. (Ukr).
13. Biham E. A Framework for Iterative Hash Functions: HAIFA [Electronic resource] / Eli Biham, Orr Dunkelman // Second cryptographic hash workshop. – 2006. – 9 c. – Access mode to the resource : http://csrc.nist.gov/groups/ST/hash/documents/DUNKELMAN_NIST3.pdf.
14. Baryshev Yu. V. Methods and means of rapid multichannel data hashing in computer systems. Author’s abstract of Сandidate of Science (Engineering) Dissertation on specialty 05.13.05 «Computer systems and components» /
Yu. V. Baryshev. – Vinnytsia : VNTU, 2012. – 20 p. (Ukr).
15. Dudatiev А. V. Software security. Part 1. Manual / А. V. Dudatiev, V. А. Каplun, S. P. Semerenko. – Vinnytsia : VNTU, 2005. – 140 p. (Ukr).

Downloads

Abstract views: 185

Published

2017-06-22

How to Cite

[1]
Y. Baryshev, V. Kaplun, and K. Neiyumina, “Discretional model and method of distributed information resources access control”., Works of VNTU, no. 2, Jun. 2017.

Issue

Section

Information Technologies and Computer Engineering

Metrics

Downloads

Download data is not yet available.