RUS  ENG
Full version
JOURNALS // Informatics and Automation // Archive

Tr. SPIIRAN, 2015 Issue 38, Pages 34–57 (Mi trspy775)

Approach to Building Secure Distributed Networks of Data Processing Based on Trusted Infrastructure

S. V. Novikov, V. M. Zima, D. V. Andrushkevich

Mozhaiskiy Space Military Academy

Abstract: An approach for building distributed computing networks and the organization of information security using trusted infrastructure is proposed. The lack of a single high-level platform-independent model of computing and information security, as well as the necessary mechanisms that implement the model at the level of its practical implementation raises many uncoordinated private decisions and leads to unnecessary pile of hardware and software organization of information processing of automated systems. Therefore, the evolutionary developing systems operating on different platforms currently require the implementation of trusted solutions in the field of information security.

Keywords: software data protection; automated system; a heterogeneous network; operating system; trusted environment; trusted in infrastructure; transparent encryption.

UDC: 004.75

DOI: 10.15622/sp.38.3



© Steklov Math. Inst. of RAS, 2024