To obtain access to full text of journal and articles you must register!
- Article name
- Critical applications isolated data processing technology
- Authors
- Shcheglov K. A., , , St.-Petersburg State University of Information Technology, Mechanics and Optics, St.-Petersburg, Russia
Shcheglov A. Yu., , info@npp-itb.spb.ru, St.-Petersburg State University of Information Technology, Mechanics and Optics, St.-Petersburg, Russia
- Keywords
- information security / access control / newly created object / secure system
- Year
- 2015 Issue 1 Pages 15 - 22
- Code EDN
- Code DOI
- Abstract
- This article is dedicated to presentation of technology which implements isolated data processing (in computational system by critical application - those application which most likely have or can be granted with malicious properties). This technology (which using is dedicated to securing against confidentiality breaches, integrity and availability provision of processed confidential data) is based on implementing suggested principles and access control methods (applications access to newly created objects, used in computational system to store confidential data).
- Text
- To obtain access to full text of journal and articles you must register!
- Buy