scholarly journals Applying conceptual graph theory to the user-driven specification of network information systems

Author(s):  
Aldo de Moor
2014 ◽  
Vol 701-702 ◽  
pp. 919-922
Author(s):  
Hong Fei Xu ◽  
Si Rui Pang ◽  
Jian Wen Du ◽  
Xue Mei Li

A system includes three power information security defense line is constructed, to achieve the information network, information outside the network, scheduling data network depth protection. According to the information security protection requirements, starting from the overall structure of information systems, taking into account the information system to schedule production system as the core, based on independent research and development of core information security isolation unit, set up three lines of defense in the power of information systems, electricity secondary system, information network systems, information systems outside the network partition protection.


2014 ◽  
Vol 48 (4) ◽  
pp. 045401 ◽  
Author(s):  
Adil Belhaj ◽  
Moulay Brahim Sedra ◽  
Antonio Segui

2020 ◽  
pp. 2-18
Author(s):  
Dmitry Tali ◽  
◽  
Oleg Finko ◽  
◽  

The purpose of the research is to increase the level of security of electronic document metadata in the face of destructive influences from authorized users (insiders). Research methods: new scientific results allowed using a combination of data integrity control method based on the «write once» method and of authentication of HMAС messages (hash-based message authentication, as well as graph theory methods. Research result: a method of cryptographic recursive 2-D control of the integrity of electronic documents metadata is proposed. The analysis of the object of the study was carried out, based on the results of which it was concluded that it is necessary to effectively protect the metadata of electronic documents processed by automated information systems of electronic document management. Developed and described a mathematical model of the proposed method, based on graph theory. The developed technical solution makes it possible to implement the functions of cryptographic recursive twodimensional control of the integrity of the metadata of electronic documents, as well as to provide the possibility of localizing modified (with signs of violation of integrity) metadata records, in conditions of destructive influences of authorized users (insiders). This, in turn, reduces the likelihood of collusion between trusted parties by introducing mutual control over the results of their actions. The proposed solution makes it possible to ensure control of the integrity of data processed by departmental automated information systems of electronic document management, where, due to the peculiarities of their construction, it is impossible to effectively use the currently popular blockchain technology.


2018 ◽  
Vol 246 ◽  
pp. 03017
Author(s):  
Kai Fan ◽  
Hang Yang ◽  
Aidong Xu

Nowadays, with the rapid development of science and technology, network information technology is widely applied to various enterprise departments. In order to meet the increasing social needs, power companies have also built power network information systems. The establishment of the network information system has been put into use, which has greatly improved the efficiency of the power enterprise. However, the security risks of network information systems have followed. Once the network is damaged by the attack, it will cause the power system to fail to operate normally, which will inevitably cause significant losses. Power system information security issues threaten the security of the power system and the entire power industry. Studying the information security of power systems, how to protect the power information network from threats, how to ensure the safe and stable supply of electricity to the whole society, and striving to develop a safe and effective power network information system is an important issue facing the development of information technology.


Sign in / Sign up

Export Citation Format

Share Document