Mots-clés : industrial maintenance
@article{VSGU_2015_6_a22,
author = {A. N. Krutov},
title = {Construction of systems of protection from unauthorized access for information systems tamper located in the industrial use},
journal = {Vestnik Samarskogo universiteta. Estestvennonau\v{c}na\^a seri\^a},
pages = {171--177},
year = {2015},
number = {6},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/VSGU_2015_6_a22/}
}
TY - JOUR AU - A. N. Krutov TI - Construction of systems of protection from unauthorized access for information systems tamper located in the industrial use JO - Vestnik Samarskogo universiteta. Estestvennonaučnaâ seriâ PY - 2015 SP - 171 EP - 177 IS - 6 UR - http://geodesic.mathdoc.fr/item/VSGU_2015_6_a22/ LA - ru ID - VSGU_2015_6_a22 ER -
%0 Journal Article %A A. N. Krutov %T Construction of systems of protection from unauthorized access for information systems tamper located in the industrial use %J Vestnik Samarskogo universiteta. Estestvennonaučnaâ seriâ %D 2015 %P 171-177 %N 6 %U http://geodesic.mathdoc.fr/item/VSGU_2015_6_a22/ %G ru %F VSGU_2015_6_a22
A. N. Krutov. Construction of systems of protection from unauthorized access for information systems tamper located in the industrial use. Vestnik Samarskogo universiteta. Estestvennonaučnaâ seriâ, no. 6 (2015), pp. 171-177. http://geodesic.mathdoc.fr/item/VSGU_2015_6_a22/
[1] Sosnin Yu. V., Kulikov G. V., Nepomnyashchikh A. V., Nashchyokin P. A., “Basic technologies of modeling procedures to protect information from unauthorized access”, Information security systems, 2014, no. 1, 23–28 (in Russian)
[2] Utebov D. R., Belov S. V., “Classification of threats in database management systems”, Vestnik of Astrakhan State University, 2008, no. 1(42), 87–92 (in Russian)
[3] Chichvarin N. V., “The choice of methods of protection of the design documentation from unauthorized access”, Information technologies, 2014, no. 5, 41–48 (in Russian)
[4] Suhanov A. V., “Quantitative evaluation of properties of the security of information systems”, Information technologies, 2010, no. 1, 7–12 (in Russian)
[5] Kajt T., Oracle for professionals, v. 2, Empowerment and protection, Second edition, OOO “TID” DS, Kiev, 2004, 848 pp. (in Russian)
[6] Krutov A. N., “Building a system of protection against unauthorized access by means of DBMS Oracle”, Modern information technologies in the activities of public authorities “Informteh 2008”, Materials of the 1st All-Russian scientific and national conference, Kursk State Technical University, Kursk, 2008, 175–177 (in Russian)