Mathematical models of information security

2012 ◽  
Vol 1 (1) ◽  
Author(s):  
Chris Hankin
2018 ◽  
Vol 25 (6) ◽  
pp. 589-606
Author(s):  
Marat M. Abbas ◽  
Vladimir A. Zakharov

Mathematical models of distributed computations, based on the calculus of mobile processes (π-calculus) are widely used for checking the information security properties of cryptographic protocols. Since π-calculus is Turing-complete, this problem is undecidable in general case. Therefore, the study is carried out only for some special classes of π-calculus processes with restricted computational capabilities, for example, for non-recursive processes, in which all runs have a bounded length, for processes with a bounded number of parallel components, etc. However, even in these cases, the proposed checking procedures are time consuming. We assume that this is due to the very nature of the π -calculus processes. The goal of this paper is to show that even for the weakest model of passive adversary and for relatively simple protocols that use only the basic π-calculus operations, the task of checking the information security properties of these protocols is co-NP-complete.


Author(s):  
O. A. Laptyev ◽  
◽  
V. I. Stepanenko ◽  
Yu. O. Tykhonov

Author(s):  
Dmitry Alexandrovich Zatuchny ◽  
Ruslan Nikolaevich Akinshin ◽  
Nina Ivanovna Romancheva ◽  
Igor Viktorovich Avtin ◽  
Yury Grigorievich Shatrakov

2020 ◽  
Vol 6 (4) ◽  
pp. 80-90
Author(s):  
S. Korelov ◽  
A. Petrov ◽  
L. Rotkov ◽  
A. Gorbunov

The functioning of almost any organization to one degree or another depends on how reliably its information resources are protected from various information security threats, one of which is spam. At the same time there have been many attempts to solve the problem of its detection once and for all. Research is ongoing in this subject area constantly. Based on its results, various approaches are proposed and implemented in practice. The authors previously proposed a model of e-mails that takes into account the content of e-mails, which often changes depending on the tasks performed by users and their changing information needs. This article discusses the issue of preprocessing e-mail texts in the problem of spam detection using a model of e-mails obtained on the basis of a genetic approach to the formation of mathematical models of texts, which has proven itself for solving various problems.


2014 ◽  
Vol 608-609 ◽  
pp. 295-299 ◽  
Author(s):  
Shun Qing Wang ◽  
Hai Yan Chen

Being important in the field of information security, it is essential to study the major process and the mathematical models of information security risk assessment.This paper proposed amodel based on the discrete dynamic Bayesian network and further studied the major process of the assessment.The experiment which works on the implementing platform shows the results are reasonable and feasible. The model proves that it iseffective to calculate the probability of the risk.


2014 ◽  
Vol 657 ◽  
pp. 708-712 ◽  
Author(s):  
Nicolae Anton ◽  
Anișor Nedelcu

This paper presents an approach to various forms of security and different access levels required in an information system by analyzing mathematical models that can be applied to this field. By describing their structural characteristics and how they find implementation in the study of information security, this paper underlines the necessity, means and effectiveness of information security modeling. The conclusions of this paper highlight the importance of a well-defined security risk management and how achieving this goal provides an opening for future research.


Sign in / Sign up

Export Citation Format

Share Document