Preview

Herald of Dagestan State Technical University. Technical Sciences

Advanced search

To the question of analysis of existing methods of access of regular users to information resources of automated systems of internal affairs bodies

https://doi.org/10.21822/2073-6185-2022-49-2-24-32

Abstract

Objective. Currently, access to the information resource of the ATS AS is implemented through the access control subsystem of the information security facility based on the mandatory and discretionary methods of access control developed in the 70s of the last century and requiring improvement. The purpose of the study is to analyze existing methods and, on this basis, select the optimal method for regular users to access information resources of automated systems of internal affairs bodies.

Method. System analysis, graph theory method, and verbal (verbal) modeling.

Result. A new aspect of the method of access of regular users to information resources of automated ATS systems, based on the use of hierarchical metrics of semantic proximity, is disclosed.

Conclusion. The use of a method based on semantic proximity significantly reduces the processing of a large amount of information, respectively, increasing the performance of automated systems. 

About the Authors

V. A. Wolf
Voronezh Institute of the Ministry of Internal Affairs of Russia
Russian Federation

adjunct,

53 Patriotov Str., Voronezh 394065



V. S. Nasedkina
Voronezh Institute of the Ministry of Internal Affairs of Russia
Russian Federation

adjunct,

53 Patriotov Str., Voronezh 394065



A. D. Popov
Voronezh Institute of the Ministry of Internal Affairs of Russia
Russian Federation

Cand.Sci. (Eng.), Lecturer, Department of Automated Information Systems of Internal Affairs Bodies,

53 Patriotov Str., Voronezh 394065



E. A. Rogozin
Voronezh Institute of the Ministry of Internal Affairs of Russia
Russian Federation

Dr. Sci. (Eng.), Prof., Prof., Department of Automated Information Systems of Internal Affairs Bodies,

53 Patriotov Str., Voronezh 394065



V. A. Khvostov
Voronezh University of Engineering Technologies
Russian Federation

Cand.Sci. (Eng.), Assoc. Prof., Department of Information Security,

19 Revolution Ave., Voronezh 394036



References

1. FSTEC RF. Guidance document. Automated systems. Protection against unauthorized access to information. Classification of automated systems and requirements for the protection of information [Electronic resource].URL:https://fstec.ru/tekhnicheskaya-zashchita-informatsii/dokumenty/114-spetsialnye-normativnye-dokumenty/384-rukovodyashchij-dokument-reshenie-predsedatelya-gostekhkomissii-rossii-ot-30-marta-1992-g (accessed 20.06.2022). (In Russ)

2. FSTEC RF. Guidance document. The concept of protection of computer equipment and automated systems from unauthorized access to information [Electronic resource]. URL: http://fstec.ru/component/attachments/ 299 (date of access: 06/26/2022). (In Russ)

3. State Technical Commission of the Russian Federation. Guidance document. Computer facilities. Protection against unauthorized access to information. Indicators of security from unauthorized access to information. M.: [Voyenizdat] Military Publishing House, 1992: 29. (In Russ)

4. Analysis of threats to information security in the processing of personal data in mobile medicine. V.P. Gulov, V.A. Khvostov, A.V. Skrypnikov, V.P. Kosolapov, G.V. Sych. [Sistemnyy analiz i uprav-leniye v biomeditsinskikh sistemakh.]System analysis and management in biomedical systems. 2020; 19(2): 129-138. (In Russ)

5. Zegzhda Petr Dmitrievich. Fundamentals of information security: textbook. P. D. Zegzh-da, E. A. Rudina; St. Petersburg State Polytechnic University. St. Petersburg: [Sankt-Peterburg: Izd-vo Politekhn. un-ta.] Publishing house of Politekhn. University. 2008: 224. (In Russ)

6. Christofides N. Graph Theory. [Algoritmicheskiy podkhod] Algorithmic approach. M.: Mir, 1978: 432. (In Russ)

7. Lepeshkin, O. M., Gappoev R. S. Mandatory model of access control based on the environment of radicals [Izvestiya YUFU. Tekhnicheskiye nauki] Izvestiya SFedU. Technical Science. 2011; 125 (12): 70-77. (In Russ)

8. Medvedev, N. V. Models of access control in distributed information system. N. V. Medvedev, G. A. Grishin. [Nauka i obrazovaniye: nauchnoye izdaniye MGTU im. N.E. Baumana] Science and education: scientific edition of MSTU im. N.E. Bauman. 2011; 1: 1. (In Russ)

9. Rogozin E. A., Khvostov A. A., Kalach A. V. [et al.] Models of information system user access control using hierarchical semantic proximity metrics. [Vestnik Vo-ronezhskogo instituta FSIN Rossii] Bulletin of the Voronezh Institute of the Federal Penitentiary Service of Russia. 2021; 4:110-120. (In Russ)

10. Gulov V. P., Khvostov V. A., Kosolapov V. P., Sych G. V. Model of individually group assignment of access to hierarchically organized objects of medical information systems using mobile technologies. [Sistemnyy analiz i upravleniye v biomeditsinskikh sistemakh] System Analysis and Management in biomedical systems. 2021; 20(1):135-146. (In Russ)


Review

For citations:


Wolf V.A., Nasedkina V.S., Popov A.D., Rogozin E.A., Khvostov V.A. To the question of analysis of existing methods of access of regular users to information resources of automated systems of internal affairs bodies. Herald of Dagestan State Technical University. Technical Sciences. 2022;49(2):24-32. (In Russ.) https://doi.org/10.21822/2073-6185-2022-49-2-24-32

Views: 326


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2073-6185 (Print)
ISSN 2542-095X (Online)