scholarly journals VIRTUAL LABORATORY CREATION FOR DISTRIBUTED INFORMATION SYSTEM SAFETY TESTING

2020 ◽  
Vol 2020 (3) ◽  
pp. 38-46
Author(s):  
Andrey Krasov ◽  
Stanislav Shterenberg ◽  
Andrey Moskal'chuk

In view of the growth of scale and significance of information structure the problem in ensuring information safety and skilled technician training in this field becomes more and more urgent. A virtual laboratory within the use of which one could carry out own investigations will render in this work a considerable assistance. In this paper there is described a method for virtual laboratory creation with the aid of which it would be possible to carry out testing for penetration and to analyze methods ensuring safety for information systems. In the course of this laboratory creation there was used license software taking into account system requirements of the computer in which this laboratory was accommodated. Further in this paper there was considered a method for penetration testing on Metasploitable 2 vulnerable machine pre-configured. Next stage of the work consists in the realization and thorough consideration of potentialities in the application of the created laboratory for the simulation of own scripts by the example of Drupal vulnerable version. In the course of the operation there was shown a code for Python allowing the fulfillment of remote code carrying out. The purpose of this work was the formation of environment allowing the mastery for hacker’s action estimate and the analysis the origin of system certain vulnerable places. The actual skills obtained will render assistance in the information safety increase of actual information systems.

Author(s):  
Sandugash Serikbayeva ◽  
J. A. Tussupov ◽  
M. A. Sambetbayeva ◽  
A.S. Yerimbetova ◽  
G.B. Borankulova ◽  
...  

Based on the analysis of typical scenarios of information servers, the tasks that should be solved when organizing an access control system for distributed information resources are formulated. The possibilities of the Z39.50 technologies as the most suitable for building such a system are considered. Within the framework of this technology, three access control models are discussed, which differ in the degree of integration of information server functions with the Z39.50 technologies.The creation and support of distributed information systems and electronic libraries that integrate heterogeneous information resources and operate in various software and hardware environments requires special approaches to managing these systems. If the resources or data themselves can be managed locally, even for distributed information systems, then the task of managing access to distributed resources cannot be solved within the framework of local administration. The justification of the last thesis can be seen when considering typical scenarios of the information server, which we will describe below


2019 ◽  
Vol 12 (1) ◽  
pp. 24-32
Author(s):  
Syed Farhan Mohsin, Syed Imran Jami

Semantic web is the growing field whose integration with Distributed Information System helps it in gluing technology. The framework of Semantic web deals with the representation, logic, rules and trust. We in this work surveyed the representation aspect of Semantic web by exploring ontologies proposed in various domains in the last three years. We observed that the research trends in semantic web for distributed information system is going in two directions i) theoretical framework ii) development of ontologies across different domains. We limited our work towards the domain of distributed information systems. Several detailed ontologies have been identified that are developed for integration with distributed information system across different domains. We conclude that ontologies need extensive work in its foundation, while more domains should be further explored in the development of robust information system in distributed environment.


Author(s):  
Zhiying Tu ◽  
Gregory Zacharewicz ◽  
David Chen

This chapter aims at proposing an approach to implement a distributed Information System built on top of a federation of existing (reused) software components. This solution is taking as a core consideration the problem of interoperability of data exchanged between enterprises. The idea is to adapt and reuse experiences coming from the development of enterprises legacy Information Systems in order to create a HLA (High Level Architecture) based system of systems. In that perspective, this chapter proposes a new bi-directional development life cycle. MDA (Model Driven Architecture) and HLA FEDEP (Federation Development and Execution Process) are combined and harmonized to implement distributed Information Systems from enterprise models of existing system. Conversely, model reverse engineering techniques are used to help re-implement existing systems, in order to be interoperable without being fully reconstructed. Then, according to HLA 1516 evolved new features, this chapter proposes a solution based on an open source RTI, poRTIco, to implement Web enabled federates.


2018 ◽  
Vol 12 (2) ◽  
pp. 160-164
Author(s):  
Katarzyna Ignatiuk ◽  
Agnieszka Dardzińska

Abstract The common issue for medical information systems are missing values. Generally, gaps are filled by statistically suggested values or rule-based methods. Another approach is to use the knowledge of information systems working under the same ontology. The medical incomplete system receives a query unable to answer, because of some unknown patient attributes. So, it has to communicate with other medical systems. The result of the collaboration is collective knowledgebase. In this paper, we propose a measure supporting choice of closest pair of systems. It determines the distance between the two systems. We use ERID algorithm to extract rules from incomplete, distributed information systems. Each constructed rule has confidence and support. They allowed to determine the distance between a pair of medical information systems. The proposed solution was verified on the basis of several “manipulated” medical information systems. Next, the solution was verified in systems with randomly selected data. The satisfying results were obtained and based on them, the proposed measure can be successfully used in medical systems to support the work of doctors and the treatment of patients.


2013 ◽  
Vol 61 (3) ◽  
pp. 569-579 ◽  
Author(s):  
A. Poniszewska-Marańda

Abstract Nowadays, the growth and complexity of functionalities of current information systems, especially dynamic, distributed and heterogeneous information systems, makes the design and creation of such systems a difficult task and at the same time, strategic for businesses. A very important stage of data protection in an information system is the creation of a high level model, independent of the software, satisfying the needs of system protection and security. The process of role engineering, i.e. the identification of roles and setting up in an organization is a complex task. The paper presents the modeling and design stages in the process of role engineering in the aspect of security schema development for information systems, in particular for dynamic, distributed information systems, based on the role concept and the usage concept. Such a schema is created first of all during the design phase of a system. Two actors should cooperate with each other in this creation process, the application developer and the security administrator, to determine the minimal set of user’s roles in agreement with the security constraints that guarantee the global security coherence of the system.


2002 ◽  
Vol 17 (5) ◽  
pp. 42-47 ◽  
Author(s):  
Jiajie Zhang ◽  
V.L. Patel ◽  
K.A. Johnson ◽  
J.W. Smith

Sign in / Sign up

Export Citation Format

Share Document