Issue of Journal № 1, 1 part [21], 2010

List of articles

Security audit

The approach to optimization of resources for information protection in organizational systems

Epifantsev B. N., Shelupanov A. A., Belov E. B.

7–9

The analysis of methods of the description of the security policy by working out of information-safe tehnologies

Varlataya S. K., Shahanova M. V.

10–13

Computer-based system for vetting information system of personal data – «AIST-P»

Shelupanov A. A., Mironova V. G., Erohin S. S., Mitsel A. A.

14–22

About one approach to the choice of experts in the field of information security

Belov V. M., Arhipova A. B.

27–31

Technique by reduction of medical information systems to requirements of the law in the field of protection of the personal data

Zykov V. D., Belyakov K. O., Ehlakov Yu. P.

32–36

Bringing the management information systems of the university in compliance with the privacy legislation

Hovanets V. A., Smolin P. V.

37–40

Cyberterrorism: concept, counteraction problems

Mazurov V. A.

41–45

Investigatory situations on affairs about wrongful remote access to the computer information

Polyakov V. V.

46–50

Approach to software safety evaluation against negative information influence

Kuznetsov S. E.

51–53

The modern BIOS firmware threats of information security

Chekin R. N.

54–55

Language model of binary codes

Edel D. A.

56–60

Hybrid supercomputer system in cryptographic analysis tasks

Fayzullin R. T., Svench A. A., Hnykin I. G.

61–63

Technical systems

Self-adjustment systems with reference model

Beynarovich V. A.

67–69

Invariant automatic control systems with relay amplifier

Beynarovich V. A.

70–73

Automated calculation of information security indicators of secured room

Zaytsev A. P., Tolstunov D. A.

74–77

Identifying regimes for generating frequency ranges of active protection facilities

Urbanovich P. V., Shelupanov A. A., Yugov N. T.

78–81

Control of pipeline broaching process in trenchless technologies

Borzyh V. E., Panfilova N. G.

82–84

Model robot’s deterministic network

Kartavtsev K. V., Melehova O. N., Timchenko S. V.

85–88

The reliability of estimate of security of voice information from leaking by technical channels

Batsula A. P., Ivanov A. A., Reva I. L., Trushin V. A.

89–92

Information security of nanoelectronics production

Zykov D. D., Mescheryakov R. V., Bondarchuk S. S.

93–94

Biometric systems

Stages of generation unique key sequence based on fingerprint papillary lines

Goncharov S. M., Suhovey A. A.

97–99

Algorithm of differentiation of access on the iris of the eye for the decision of problems of the control of access to information resources

Tretyakov I. N., Minakova N. N.

100–102

About correlations of polygraph, thermovision camera and electroencephalograph rah signals

Epifantsev B. N., Mekin A. N.

103–107

Generalized authorship identification technique

Romanov A. S., Shelupanov A. A., Bondarchuk S. S.

108–112

Person identification by fractal dimension fingerprints and control access systems

Trifonov D. I.

113–117

Information criteria for processing of biometric signals with neural networks

Kostyuchenko E. Yu., Mescheryakov R. V., Kraynov A. Yu.

118–120

About informativeness of «modulating» functions of speech messages

Epifantsev B. N., Ilyuschenko M. S.

121–123

Development of interactive applications with multimodal interface

Ronzhin A. L., Karpov A. A.

124–127

Hierarchical approach in a problem of voice speaker identification on the basis of projection methods of the analysis multivariate data

Malinin P. V., Polyakov V. V.

128–130

To the question on research of biological parameters of the person in the protected systems

Mescheryakov R. V., Konev A. A.

131–133

Security of telecommunication systems

Organization of the processing the united flow of the messages in portioned computing ambience

Rodin E. A., Golev A. S.

137–142

Role differentiation of access for the user automated workplace at operative remote control of the confidential information

Golovin A. V., Polyakov V. V., Lapin S. A.

143–145

A classification of role-based delegation models

Kirillov D. V.

146–149

Probabilistic method of spam detection

Korelov S. V., Rotkov L. Yu., Ryabov A. A.

150–152

Estimations of information security and noise stabilities of the invariant communication system

Lebedyantsev V. V., Morozov E. V.

153–155

Influence of threats of informational security on availability of a telecommunication network with linear topology

Mitrohin V. E., Ringenblyum P. G.

156–159

Algorithm and implementation of the network data filter with concealed from the outside observer rules

Sergeev D. V., Hadi R. A.

160–162

Method of user information securing integrity based on parallel link organization at the open system interconnection network layer

Solonskaya O. I.

163–167

The module of interaction with mobile staff

Melnikov M. I., Nekrylova M. O., Zykov D. D.

168–169

Method of Coding of Information Objects on the Basis of Trees And-Or

Kruchinin V. V., Lyukshin B. A.

170–172

Use of cellular automatons for problems solving of information transformation

Evsyutin O. O., Rossoshek S. K.

173–174

Viktor N. Maslennikov

Executive Secretary of the Editor’s Office

 Editor’s Office: 40 Lenina Prospect, Tomsk, 634050, Russia

  Phone / Fax: + 7 (3822) 51-21-21 / 51-43-02

  vnmas@tusur.ru

Subscription for updates