References
- Anikin, S. N., Domrachev, A. A., Dralo, M. P., Dupan, A. S., Kiryushkin, S. A., & Furgel, A. (2017). Methodology of forming a cross-border trust space. Information Security. INSIDE. 3. -pp. 6–12 (In Russian).
- Biyashev, R. G. (1985). Development and investigation of methods of the overall increase in reliability in data exchange systems of distributed ACSs (Doctoral Dissertation in Technical Sciences), Moscow.
- Biyashev, R. G., & Nyssanbayeva, S. E. (2012). Algorithm for creation a digital signature with error detection and correction. Cybernetics and Systems Analysis, 4, 489–13. doi:10.1007/s10559-012-9428-5
- Biyashev, R. G., Nyssanbayeva, S. E., & Begimbayeva, Y. Y. (2016). Development of the model of protected cross-border information interaction. Open Engineering, 6, 199–20. doi:10.1515/eng-2016-0025
- FIPS 140-2 Standard and Self-Encryption Technology. (2018). [Electronic resource]. Retrieved from https://www.seagate.com/files/www-content/solutions-content/security-and-encryption/id/docs/faq-fips-sed-lr- mb-605-2-1302-ru.pdf/
- Gaydamakin, N. A. (2003). Differentiation of access to information in computer systems (pp. 328). Ekaterinburg: Publishing house Ural. University.
- Hosmer, H. 1993. The multipolicy paradigm for trusted systems. In J. B. Michael, V. Ashby, & C. Meadows (Eds.), Proceedings on the 1992-1993 workshop on New security paradigms (NSPW ‘92-93) (pp. 19–32). New York, NY, USA: ACM. doi:10.1145/283751.283768
- Ivanov, K.K., Yurchenko, R. N., & Yarmonov, A. S. (2016). Information security in automated systems (Vol. 29, pp. 22–24). Young Scientist (In Russian).
- Kalimoldayev, M. N., Biyashev, R. G., Nyssanbayeva, S. E., & Begimbayeva, Y. Y. (2016). Modification of the digital signature, developed on the nonpositional polynomial notations. Eurasian Journal of Mathematical and Computer Applications, 4(2), 33–38.
- National Institute of Standards and Technology (NIST). (2018). [Electronic resource]. Retrieved from https://www.nist.gov/
- National Security Agency. (2018). [Electronic resource]. Retrieved from https://www.cryptomuseum.com/intel/nsa/index.htm/
- Nyssanbayeva, S., Wojcik, W., & Ussatova, O. (2019). Algorithm for generating temporary password based on the two- factor authentication model. Przegląd Elektrotechniczny, 5, 101–106. Poland, ISSN 0033-2097, R. 95, P.
- Sandhu, R. S., & Samarati, P. (1994). Access control: Principle and practice. IEEE Communications Magazine, 32(9), 40–48. doi:10.1109/35.312842
- The Secret of Cross-Border Correspondence. (2017). Retrieved from http://www.synerdocs.ru/5926669.aspx
- State Standard of the Republic of Kazakhstan. (2019). Information technology. Set of standards for automated systems. Automated systems. Terms and Definitions. ST RK 34.014-2002. Retrieved from https://online.zakon.kz/Document/?doc_id=31056334
- Two-factor authentication. (2019). [Electronic resource]. Retrieved from https://www.infobip.com/ru/glossariy/dvukhfaktornaya - autentifikatsiya
- Ussatova, O., & Nyssanbayeva, S. (2019). Generators of one-time two-factor authentication passwords. Informatyka, Automatyka, Pomiary w Gospodarcei Ochronie Środowiska, Poland, 2, ISSN 2083-0157, R. 72, P. 60–64. doi:10.5604/01.3001.0013.2550
- Zegzhda, D. P. (1996). Theory and practice of information security. M.: Yachtsman, 302 p. (In russian).