THE ISSUE OF THE JOURNAL
“INFORMATION SECURITY QUESTIONS”
(No 1. 2016)
Journal name | INFORMATION SECURITY QUESTIONS |
ISSN | 2073-2600 | Date | 1 quarter 2016 |
Volume | Issue | 1 | |
Page | 1-81 | Articles number | 12 |
N | Article name | Page | |
TECHNICAL PROTECTION OF INFORMATION. ACCESS CONTROL | |||
1 | Resource access control system integration in conditions of tight soft and hardware radiostation platform
Kutsepalov N. O. (ANCUD Ltd ) Lubushkina I. E. (ANCUD Ltd ) | 3-7 | |
2 | The Use of Single Sign-On and Role-Based Access Model for Database Access from the Internet using Middleware Servers
Ahmed Wesam M. A. (Volgograd State Technical University ) | 8-11 | |
3 | Identification possibilities assessment of biometric features from standard peripheral equipment
Vasiliev V. I. (Ufa State Aviation Technical University ) Zhumazhanova S. S. (LLC "New WEB-technologies" ) Lozhnikov P. S. (Omsk State Technical University ) Sulavko A. E. (Omsk State Technical University ) | 12-20 | |
4 | The registration and verification formal apparatus of biometric data for devices with small memory sizes
Stepanov A. Yu. (National Research University of Electronic Technology (MIET) ) Yanakova E. S. (National Research University of Electronic Technology (MIET) ) | 21-27 | |
5 | The use of network -based pattern recognition Neocognitron
Kozlov P. V. (Perm National Research Polytechnic University ) Yuzhakov A. A. (Perm National Research Polytechnic University ) | 28-31 | |
TECHNICAL PROTECTION OF INFORMATION. TRUSTED ENVIRONMENT | |||
6 | Method for detection of information leakage channels on the basis of distributed system of receiving devices
Bylinkin A. A. (Moscow Technological University ) Goncharenko B. Yu. (Moscow Technological University ) Karman S. A. (Moscow Technological University ) | 32-38 | |
7 | On the possibility of hiding the geolocation of a subscriber of a cellular network using methods of secure computation
Kazarin O. V. (Institute for Information Sciences and Security Technologies of Russian State University of the Humanities (IISST RSUH); Institute of Information Security Issues of Lomonosov University Moscow (IISI MSU) ) | 39-47 | |
8 | Method of recognition of computer attacks to crucial information systems
Klimov S. M. (4th Central scientific research institute of the Ministry of Defence of the Russian Federation ) Polovnikov A. Yu. (4th Central scientific research institute of the Ministry of Defence of the Russian Federation ) | 48-55 | |
GENERAL SAFETY INFORMATION AND FACILITIES | |||
9 | Assessment of methodological approaches for the formation of security systems for the complex industrial Energy facilities
Livshitz I. I. (LLC "GasInformService" ) | 56-61 | |
10 | Evaluation of depth of extraneous modulation of the light in optical cable system with heterogeneity
Grishachev V. V. (Institute for Information Sciences and Security Technologies Russian State University of the Humanities ) Kalinina Yu. D. (Institute for Information Sciences and Security Technologies Russian State University of the Humanities ) Tarasov A. A. (Institute for Information Sciences and Security Technologies Russian State University of the Humanities ) | 62-73 | |
11 | Methods and algorithms for optimization of parameters of LAN components in their design
Dorodnikov N. A. (Saint-Petersburg National Research University of Information Technologies, Mechanics and Optics ) Yuryeva R. A. (Saint-Petersburg National Research University of Information Technologies, Mechanics and Optics ) Arustamov S. A. (Saint-Petersburg National Research University of Information Technologies, Mechanics and Optics ) | 74-78 | |