COMPUTER TECHNOLOGIES IN INFORMATION SECURITY


КОЛЕКТИВ АВТОРІВ: Alishov Nadir, Albanskyi Ivan, Bredelev Boris, Davletova Alina, Franko Yurii, Humenniy Petro, Ivasyev Stepan, Kasianchuk Mykhaylo, Kimak Volodymyr, Krulikovskyi Boris, Kudin Anton, Liura Oleg, Nykolaichuk Lubov, Pikh Volodymyr, Pitukh Ihor, Protsiuk Halyna, Segin Andriy, Shvidchenko Inna, Volynskyy Orest, Voronych Artur, Vozna Nataliia, Yakymenko Ihor, Yatskiv Vasyl, Zastavnyi Oleg, Zavediuk Tetiana /edited by Valeriy Zadiraka, Yaroslav Nykolaichuk.

Methods of Effective Protection of Information Flows / edited by Valeriy Zadiraka, Yaroslav Nykolaichuk.- Ternopil: Terno-graf, 2014.- 308 p.

АНОТАЦІЯ: The fundamentals of the theory and practice of crypto protection structured information flow and signals are described In the monograph. First attempt is made to generalize the theory and methodology of cryptographic and stenographic protocols for cloud systems. The characteristics of cloud systems and cloud security standards in modern information society are determined. The formalized description is shaped of the basic principles of arithmetic logic operations in various theoretical-numerical bases for CPU processing of large numbers and bit information encryption. Particular attention is paid to algorithms of transformations and implementation between-bases transitions of high-performance special processors correlation data processing in the Haar-Krestenson’s basis. Theory of structuring information flow in interactive computer systems is stated, the processes of forming and processing of structured data and evaluation of information entropy measures are described. Theoretical foundations of structuring data cluster monitoring of quasistationary objects are set out. Characteristics correcting codes are systematized. The attention is paid to the theoretical foundations of information flow protection against errors and unauthorized access based on a new class of signal correcting codes. Theoretical approaches, methods and models protect the information flow are reviewed and based on number theory and Krestenson’s theoretical-numerical basis. The two-dimensional matrix and fractal models in the vicinity of data encryption solutions of RSA’s standard are systematized. The principles of information technology and associative multiport memory with multi-access protection against unauthorized access are formulated. Solving the problem of images recognition based special processors on neural components is considered. Information security of intellectual subject of law and dynamic of its quasi-stationary communications is described.