GENERALIZED MODEL OF INFORMATION PROTECTION PROCESS IN AUDIOVISUAL CONTENT DISTRIBUTION NETWORKS
Article Sidebar
Open full text
Issue Vol. 12 No. 4 (2022)
-
SCATTERING BY CIRCULAR VOIDS WITH RIGID BOUNDARY: DIRECT AND INVERSE PROBLEMS FOR OPEN AND CLOSE DOMAINS
Tomasz Rymarczyk, Jan Sikora4-10
-
FINITE ELEMENT MODEL FOR ANALYSIS OF CHARACTERISTICS OF SHROUDED ROTOR BLADE VIBRATIONS
Anatoliy Zinkovskii, Kyrylo Savchenko, Yevheniia Onyshchenko, Leonid Polishchuk, Abilkaiyr Nazerke, Bagashar Zhumazhanov11-16
-
EFFICIENTLY PROCESSING DATA IN TABLE WITH BILLIONS OF RECORDS
Piotr Bednarczuk, Adam Borsuk17-20
-
GENERALIZED MODEL OF INFORMATION PROTECTION PROCESS IN AUDIOVISUAL CONTENT DISTRIBUTION NETWORKS
Heorhii Rozorinov, Oleksandr Hres, Volodymyr Rusyn21-25
-
MONITORING OF LINK-LEVEL CONGESTION IN TELECOMMUNICATION SYSTEMS USING INFORMATION CRITERIA
Natalia Yakymchuk, Yosyp Selepyna, Mykola Yevsiuk, Stanislav Prystupa, Serhii Moroz26-30
-
POLARIZATION TOMOGRAPHY OF THE POLYCRYSTALINNE STRUCTURE OF HISTOLOGICAL SECTIONS OF HUMAN ORGANS IN DETERMINATION OF THE OLD DAMAGE
Olexandra Litvinenko, Victor Paliy, Olena Vуsotska, Inna Vishtak, Saule Kumargazhanova31-34
-
ANALYSIS OF UPPER RESPIRATORY TRACT SEGMENTATION FEATURES TO DETERMINE NASAL CONDUCTANCE
Oleg Avrunin, Yana Nosova, Nataliia Shushliapina, Ibrahim Younouss Abdelhamid, Oleksandr Avrunin, Svetlana Kyrylashchuk, Olha Moskovchuk, Orken Mamyrbayev35-40
-
THE USE OF Q-PREPARATION FOR AMPLITUDE FILTERING OF DISCRETED IMAGE
Leonid Timchenko, Natalia Kokriatskaia, Mykhailo Rozvodiuk, Volodymyr Tverdomed, Yuri Kutaev, Saule Smailova, Vladyslav Plisenko, Liudmyla Semenova, Dmytro Zhuk41-46
-
INFORMATION MODEL OF THE ASSESSMENT OF TOURISM SECTOR COMPETITIVENESS IN THE CONTEXT OF EUROPEAN INTEGRATION POLICY
Iryna Prychepa, Oksana Adler, Liliia Ruda, Olexander Lesko, Zlata Bondarenko, Lee Yanan, Dinara Mussayeva47-52
-
FORECASTING BUSINESS PROCESSES IN THE MANAGEMENT SYSTEM OF THE CORPORATION
Svitlana A. Yaremko, Elena M. Kuzmina, Nataliia B. Savina, Iryna Yu. Yepifanova, Halyna B. Gordiichuk, Dinara Mussayeva53-59
-
ELABORATION AND RESEARCH OF A MODEL OF OPTIMAL PRODUCTION AND DEVELOPMENT OF INDUSTRIAL SYSTEMS TAKING INTO ACCOUNT THE USE OF THE EXTERNAL RESOURCES
Dmytro Hryshyn, Taisa Borovska, Aliya Kalizhanova60-66
-
MODELING THE DEVELOPMENT PROCESS OF INCLUSIVE EDUCATION IN UKRAINE
Mariana M. Kovtoniuk, Olena P. Kosovets, Olena M. Soia, Olga Yu. Pinaieva, Vira G. Ovcharuk, Kuralay Mukhsina67-73
-
FREQUENCY-TO-CODE CONVERTER WITH DIRECT DATA TRANSMISSION
Piotr Warda74-77
-
DIGITAL APPROACH TO THERMIONIC EMISSION CURRENT TO VOLTAGE CONVERSION FOR HIGH-VOLTAGE SOURCES OF ELECTRONS
Bartosz Kania78-81
-
[Retracted]: SYSTEM SOFTWARE AT LABORATORY STAND „LIGHTS CONTROL ON THE BASIS OF PROGRAMMABLE LOGIC CONROLLER”
The article has been retracted due to a breach of ethical standards. The editorial board received a report that this work infringes on the copyrights of others. An investigation confirmed the validity of the report, resulting in the decision to retract the work. The evidence in the case is in the possession of the editorial board. The editorial board of the journal also declares that it has followed all procedures for checking the article for unethical practices before its publication in 2022.Laura Yesmakhanova, Raushan Dzhanuzakova, Bauyrzhan Myrkalykov82-86 -
FLAME ANALYSIS BY SELECTED METHODS IN THE FREQUENCY DOMAIN
Żaklin Grądz, Jacek Klimek, Czesław Kozak87-89
Archives
-
Vol. 14 No. 4
2024-12-21 25
-
Vol. 14 No. 3
2024-09-30 24
-
Vol. 14 No. 2
2024-06-30 24
-
Vol. 14 No. 1
2024-03-31 23
-
Vol. 13 No. 4
2023-12-20 24
-
Vol. 13 No. 3
2023-09-30 25
-
Vol. 13 No. 2
2023-06-30 14
-
Vol. 13 No. 1
2023-03-31 12
-
Vol. 12 No. 4
2022-12-30 16
-
Vol. 12 No. 3
2022-09-30 15
-
Vol. 12 No. 2
2022-06-30 16
-
Vol. 12 No. 1
2022-03-31 9
-
Vol. 11 No. 4
2021-12-20 15
-
Vol. 11 No. 3
2021-09-30 10
-
Vol. 11 No. 2
2021-06-30 11
-
Vol. 11 No. 1
2021-03-31 14
-
Vol. 10 No. 4
2020-12-20 16
-
Vol. 10 No. 3
2020-09-30 22
-
Vol. 10 No. 2
2020-06-30 16
-
Vol. 10 No. 1
2020-03-30 19
Main Article Content
DOI
Authors
Abstract
The most important indicators of the effectiveness of content protection systems are indicators of the achieved security level, i.e. functional properties of security. These indicators are: confidentiality, integrity, availability. Each of the indicators of the functional properties of content security is distributed according to the methods of ensuring and the degree of its achievement. A significant drawback of such indicators is that they are qualitative. This significantly narrows the scope of their use and makes it impossible to use them in mathematical expressions for optimizing the parameters of protection means, obtaining quantitative estimates of the performance quality of the protection system or its components, etc. The work offers a number of quantitative indicators, which, depending on the purpose, can be probabilistic and temporal. Calculation of such indicators makes it possible to assess the degree of ensuring the functional properties of information security or the possible degree of ensuring the functional properties of protected information.
Keywords:
References
Al-Mukaddim K. P., Rajkumar B.: A Taxonomy and Survey of Content Delivery Networks. Australia, 2007.
Andreev V. I., Kozlov V. S., Horoshko V. A.: Kolychestvennaya otsenka zashishennosti tekhnicheskikh obektov s uchetom ikh funktsionirovaniya. Zakhyst informatsiyi 2, 2004, 47–51.
Ayankoya F., Otushile O., Ohwo B.: A Review on Content Delivery Networks and Emerging Paradigms. International Journal of Scientific & Engineering Research 9, 2018, 211–217.
Bohush V. M., Kudin A. M.: Monitorynh system informatsiinoi bezpeky. DUIKT, Kyiv 2006.
Charles D. C. et al.: Enhanced Streaming Services in a Content Distribution Network. IEEE Computing Society, 2001, 66–75. DOI: https://doi.org/10.1109/4236.939452
Dmitrenko A. P., Sirchenko G. A., Horoshko V. A.: Modeli bezopasnogo soedineniya s udalennymi obektami. Zakhyst informatsiyi 1, 2010, 53–57.
Dmitrenko A.P., Sirchenko G.A., Horoshko V.A.: Statisticheskoe modelirovanie dlya ocenki zashhishhennosti lokalnoj seti. Visnyk DUIKT 1, 2010, 62–67.
Ingmar P. et al.: Improving Content Delivery with Provider-aided Distance Information System (PaDIS). IEEE Computer Society, 2012, 44–52.
Jaeyeon J., Balachander K., Rabinovich M.: Flash crowds and denial of service attacks: Characterization and implications for CDNs and Web sites. 11th International World Wide Web Conference Hawaii: ACM, 2002, 293–304.
Kirichek R., Kulik V., Koucheryavy A.: False clouds for Internet of Things and methods of protection. 18th International Conference on Advanced Communication Technology, Pyeongchang, South Korea 2016, 201–205. DOI: https://doi.org/10.1109/ICACT.2016.7423328
Moroz S. et al.: Methods for ensuring data security in mobile standards. Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska – IAPGOS, 1, 2022, 4–9 [http://doi.org/10.35784/iapgos.2877]. DOI: https://doi.org/10.35784/iapgos.2877
Nikolaienko B., Vasylenko S.: Application of the threat intelligence platform to increase the security of government information resources. Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska – IAPGOS 4, 2021, 9–13 [http://doi.org/10.35784/iapgos.2822]. DOI: https://doi.org/10.35784/iapgos.2822
Politanskyi R., Politanskyi L., Hres O., Lesinskyi V. Statistical estimation of pseudorandom number sequences. 14th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering, TCSET 2018, 873–876. DOI: https://doi.org/10.1109/TCSET.2018.8336335
Rusyn V. et al.: Computer Modelling of the Information Properties of Hyper Chaotic Lorenz System and Its Application in Secure Communication System. Journal of Physics: Conference Series 1764, 2021, 012205 [http://doi.org/10.1088/1742-6596/1764/1/012205]. DOI: https://doi.org/10.1088/1742-6596/1764/1/012205
Rusyn V., Sambas A., Mujiarto: Information security system based on chaotic signals. CEUR Workshop Proceedings 3039, 2021, 294–299.
Rusyn V., Subbotin S., Sambas A.: Simple autonomous security system based on Arduino UNO platform and fingerprint scanner module: A study case. CEUR Workshop Proceedings 2864, 2021, 262–271. DOI: https://doi.org/10.32782/cmis/2864-23
Shirochin V. P., Muhin V. E., Kramar D. I.: Analiz riskov v zadachah monitoringa bezopasnosti kompyuternyh sistem i setej. Zakhyst informatsii 1, 2003, 28–34.
Shoroshev V. V., Ilnytskyi A. Yu.: Informatsiino-analitychna model bazovoho pervynnoho zakhystu PEOM vid zahroz NSD. Byznes y bezopasnost 3–5, 1999, 32–39.
Shushura O. M. et al.: Simulation of information security risks of availability of project documents based on fuzzy logic. Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska – IAPGOS 3, 2022, 64–68 [http://doi.org/10.35784/iapgos.3033]. DOI: https://doi.org/10.35784/iapgos.3033
Sirchenko H. A.: Zadachi zabezpechennia tsilisnosti ta dostupnosti informatsiinykh obiektiv v komunikatsiinykh merezhakh. Zakhyst informatsii 2, 2010, 49–54.
Vasilenko V. S., Korolenko M. P.: Celostnost informacii v avtomatizirovannyh sistemah. Korporativnye sistemy 3, 1999, 52–58.
Vyshnivskyi V. V., Sribna I. M., Zinchenko O. V.: Analysis of technical solutions for identification of internet things in modern communication networks. Electronics and Control Systems 1, 2021, 33–39 [http://doi.org/10.18372/1990-5548.67.15583].
Article Details
Abstract views: 281
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
