RUS  ENG
Full version
JOURNALS // Sistemy i Sredstva Informatiki [Systems and Means of Informatics] // Archive

Sistemy i Sredstva Inform., 2016 Volume 26, Issue 3, Pages 74–82 (Mi ssi475)

This article is cited in 2 papers

Architectural vulnerabilities of distributed information systems

A. A. Grusho, N. A. Grusho, E. E. Timonina, S. Ya. Shorgin

Institute of Informatics Problems, Federal Research Center "Computer Science and Control" of the Russian Academy of Sciences, 44-2 Vavilova Str., Moscow 119333, Russian Federation

Abstract: The paper is devoted to the analysis of architectural vulnerabilities of the distributed information systems. Such vulnerability, which cannot be closed by the existing set of mechanisms of information security or for which ways of its closing are unknown, is called an architectural vulnerability in the distributed information systems. The examples of architectural vulnerabilities show that usually, these vulnerabilities are connected with the inadmissible or missed from attention interactions in distributed information systems. For closing or partial closing of architectural vulnerabilities, a special architecture which does not allow directly forbidden interactions was created. For this purpose, it is possible to use methods of restriction of influences of some components of distributed information systems on other components.

Keywords: vulnerabilities of distributed information systems; architectural vulnerabilities; methods of architectural vulnerabilities analysis.

Received: 15.08.2016

DOI: 10.14357/08696527160305



Bibliographic databases:


© Steklov Math. Inst. of RAS, 2024