1,004
Views
2
CrossRef citations to date
0
Altmetric
COMPUTER SCIENCE

Development of an automated system model of information protection in the cross-border exchange

ORCID Icon, , & | (Reviewing editor)
Article: 1724597 | Received 28 Oct 2019, Accepted 18 Jan 2020, Published online: 06 Feb 2020

References

  • Anikin, S. N., Domrachev, A. A., Dralo, M. P., Dupan, A. S., Kiryushkin, S. A., & Furgel, A. (2017). Methodology of forming a cross-border trust space. Information Security. INSIDE. 3. -pp. 6–12 (In Russian).
  • Biyashev, R. G. (1985). Development and investigation of methods of the overall increase in reliability in data exchange systems of distributed ACSs (Doctoral Dissertation in Technical Sciences), Moscow.
  • Biyashev, R. G., & Nyssanbayeva, S. E. (2012). Algorithm for creation a digital signature with error detection and correction. Cybernetics and Systems Analysis, 4, 489–13. doi:10.1007/s10559-012-9428-5
  • Biyashev, R. G., Nyssanbayeva, S. E., & Begimbayeva, Y. Y. (2016). Development of the model of protected cross-border information interaction. Open Engineering, 6, 199–20. doi:10.1515/eng-2016-0025
  • FIPS 140-2 Standard and Self-Encryption Technology. (2018). [Electronic resource]. Retrieved from https://www.seagate.com/files/www-content/solutions-content/security-and-encryption/id/docs/faq-fips-sed-lr- mb-605-2-1302-ru.pdf/
  • Gaydamakin, N. A. (2003). Differentiation of access to information in computer systems (pp. 328). Ekaterinburg: Publishing house Ural. University.
  • Hosmer, H. 1993. The multipolicy paradigm for trusted systems. In J. B. Michael, V. Ashby, & C. Meadows (Eds.), Proceedings on the 1992-1993 workshop on New security paradigms (NSPW ‘92-93) (pp. 19–32). New York, NY, USA: ACM. doi:10.1145/283751.283768
  • Ivanov, K.K., Yurchenko, R. N., & Yarmonov, A. S. (2016). Information security in automated systems (Vol. 29, pp. 22–24). Young Scientist (In Russian).
  • Kalimoldayev, M. N., Biyashev, R. G., Nyssanbayeva, S. E., & Begimbayeva, Y. Y. (2016). Modification of the digital signature, developed on the nonpositional polynomial notations. Eurasian Journal of Mathematical and Computer Applications, 4(2), 33–38.
  • National Institute of Standards and Technology (NIST). (2018). [Electronic resource]. Retrieved from https://www.nist.gov/
  • National Security Agency. (2018). [Electronic resource]. Retrieved from https://www.cryptomuseum.com/intel/nsa/index.htm/
  • Nyssanbayeva, S., Wojcik, W., & Ussatova, O. (2019). Algorithm for generating temporary password based on the two- factor authentication model. Przegląd Elektrotechniczny, 5, 101–106. Poland, ISSN 0033-2097, R. 95, P.
  • Sandhu, R. S., & Samarati, P. (1994). Access control: Principle and practice. IEEE Communications Magazine, 32(9), 40–48. doi:10.1109/35.312842
  • The Secret of Cross-Border Correspondence. (2017). Retrieved from http://www.synerdocs.ru/5926669.aspx
  • State Standard of the Republic of Kazakhstan. (2019). Information technology. Set of standards for automated systems. Automated systems. Terms and Definitions. ST RK 34.014-2002. Retrieved from https://online.zakon.kz/Document/?doc_id=31056334
  • Two-factor authentication. (2019). [Electronic resource]. Retrieved from https://www.infobip.com/ru/glossariy/dvukhfaktornaya - autentifikatsiya
  • Ussatova, O., & Nyssanbayeva, S. (2019). Generators of one-time two-factor authentication passwords. Informatyka, Automatyka, Pomiary w Gospodarcei Ochronie Środowiska, Poland, 2, ISSN 2083-0157, R. 72, P. 60–64. doi:10.5604/01.3001.0013.2550
  • Zegzhda, D. P. (1996). Theory and practice of information security. M.: Yachtsman, 302 p. (In russian).