To obtain access to full text of journal and articles you must register!
- Article name
- Criteria and methods of verification of the fulfillment of requirements for an automated system security settings are changed or allocated resources of information security
- Authors
- Kulikov G. V., , , JSC "NPO RusBITeh", Moscow, Russia
Nepomnyashchikh A. V., , planetnaya3@gmail.com, JSC "NPO RusBITeh", Moscow, Russia
Sosnin Yu. V., , , JSC "NPO RusBITeh", Moscow, Russia
Nashchekin P. A., , , JSC "Concern" Systemprom", Moscow, Russia
- Keywords
- information security / security automation system / protection of information / the level of information security
- Year
- 2013 Issue 4 Pages 50 - 53
- Code EDN
- Code DOI
- Abstract
- The features of the process of verification of the fulfillment of requirements for protection of the automated system for changing settings or dedicated resources of information security, the algorithm checks the requirements for security and automated monitoring of information security technology.
- Text
- To obtain access to full text of journal and articles you must register!
- Buy