Construction of systems of protection from unauthorized access for information systems tamper located in the industrial use
Vestnik Samarskogo universiteta. Estestvennonaučnaâ seriâ, no. 6 (2015), pp. 171-177 Cet article a éte moissonné depuis la source Math-Net.Ru

Voir la notice de l'article

The article discusses the question of construction of the systems of protection against unauthorized access to information systems that are in commercial operation. It offers two concepts of development of the system from unauthorized access with minimal modifications in the already developed information system. As a means of building an effective system of protection in the process means of careful monitoring of access database DBMS Oracle (Fine Grained Access Control) are used. Depending on the size of the source database and the possibility to modify the table structure of the information system it is offered to use one or the other method for constructing a system of protection against unauthorized access. Developed protection system is relatively independent module that can be implemented in as needed.
Keywords: database, database management system, information systems, unauthorized access, system of protection, security model, fine grained access control.
Mots-clés : industrial maintenance
@article{VSGU_2015_6_a22,
     author = {A. N. Krutov},
     title = {Construction of systems of protection from unauthorized access for information systems tamper located in the industrial use},
     journal = {Vestnik Samarskogo universiteta. Estestvennonau\v{c}na\^a seri\^a},
     pages = {171--177},
     year = {2015},
     number = {6},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/VSGU_2015_6_a22/}
}
TY  - JOUR
AU  - A. N. Krutov
TI  - Construction of systems of protection from unauthorized access for information systems tamper located in the industrial use
JO  - Vestnik Samarskogo universiteta. Estestvennonaučnaâ seriâ
PY  - 2015
SP  - 171
EP  - 177
IS  - 6
UR  - http://geodesic.mathdoc.fr/item/VSGU_2015_6_a22/
LA  - ru
ID  - VSGU_2015_6_a22
ER  - 
%0 Journal Article
%A A. N. Krutov
%T Construction of systems of protection from unauthorized access for information systems tamper located in the industrial use
%J Vestnik Samarskogo universiteta. Estestvennonaučnaâ seriâ
%D 2015
%P 171-177
%N 6
%U http://geodesic.mathdoc.fr/item/VSGU_2015_6_a22/
%G ru
%F VSGU_2015_6_a22
A. N. Krutov. Construction of systems of protection from unauthorized access for information systems tamper located in the industrial use. Vestnik Samarskogo universiteta. Estestvennonaučnaâ seriâ, no. 6 (2015), pp. 171-177. http://geodesic.mathdoc.fr/item/VSGU_2015_6_a22/

[1] Sosnin Yu. V., Kulikov G. V., Nepomnyashchikh A. V., Nashchyokin P. A., “Basic technologies of modeling procedures to protect information from unauthorized access”, Information security systems, 2014, no. 1, 23–28 (in Russian)

[2] Utebov D. R., Belov S. V., “Classification of threats in database management systems”, Vestnik of Astrakhan State University, 2008, no. 1(42), 87–92 (in Russian)

[3] Chichvarin N. V., “The choice of methods of protection of the design documentation from unauthorized access”, Information technologies, 2014, no. 5, 41–48 (in Russian)

[4] Suhanov A. V., “Quantitative evaluation of properties of the security of information systems”, Information technologies, 2010, no. 1, 7–12 (in Russian)

[5] Kajt T., Oracle for professionals, v. 2, Empowerment and protection, Second edition, OOO “TID” DS, Kiev, 2004, 848 pp. (in Russian)

[6] Krutov A. N., “Building a system of protection against unauthorized access by means of DBMS Oracle”, Modern information technologies in the activities of public authorities “Informteh 2008”, Materials of the 1st All-Russian scientific and national conference, Kursk State Technical University, Kursk, 2008, 175–177 (in Russian)