Theoretical aspects of information security
Fundamentalʹnaâ i prikladnaâ matematika, Tome 13 (2007) no. 5, pp. 81-102.

Voir la notice de l'article provenant de la source Math-Net.Ru

We construct a formal model of a security control system for automated systems and analyze errors in making decisions concerning the system's security level in conditions of partial information availability.
@article{FPM_2007_13_5_a2,
     author = {A. S. Vydrin},
     title = {Theoretical aspects of information security},
     journal = {Fundamentalʹna\^a i prikladna\^a matematika},
     pages = {81--102},
     publisher = {mathdoc},
     volume = {13},
     number = {5},
     year = {2007},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/FPM_2007_13_5_a2/}
}
TY  - JOUR
AU  - A. S. Vydrin
TI  - Theoretical aspects of information security
JO  - Fundamentalʹnaâ i prikladnaâ matematika
PY  - 2007
SP  - 81
EP  - 102
VL  - 13
IS  - 5
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/FPM_2007_13_5_a2/
LA  - ru
ID  - FPM_2007_13_5_a2
ER  - 
%0 Journal Article
%A A. S. Vydrin
%T Theoretical aspects of information security
%J Fundamentalʹnaâ i prikladnaâ matematika
%D 2007
%P 81-102
%V 13
%N 5
%I mathdoc
%U http://geodesic.mathdoc.fr/item/FPM_2007_13_5_a2/
%G ru
%F FPM_2007_13_5_a2
A. S. Vydrin. Theoretical aspects of information security. Fundamentalʹnaâ i prikladnaâ matematika, Tome 13 (2007) no. 5, pp. 81-102. http://geodesic.mathdoc.fr/item/FPM_2007_13_5_a2/

[1] GOST R ISO/MEK 15408-2002, Informatsionnaya tekhnologiya. Metody i sredstva obespecheniya bezopasnosti. Kriterii otsenki bezopasnosti informatsionnykh tekhnologii

[2] Devyanin N. P., Modeli bezopasnosti kompyuternykh sistem, Akademiya, M., 2005

[3] Kurilo A. P., Zefirov S. L., Golovanov V. B. i dr., Audit informatsionnoi bezopasnosti, BDTs-press, M., 2006

[4] Shiryaev A. N., Veroyatnost, T. 1, 2, MTsNMO, M., 2004

[5] ISO/IEC 27001:2005, Information Technology. Security Techniques. Information Security Management Systems

[6] ISO/IEC IS 17799-2005, Information Technology. Code of Practice for Information Security Management