The analysis of methods of the description of the security policy by working out of information-safe tehnologies

Download article in PDF format

Authors: Varlataya S. K., Shahanova M. V.

Annotation: In the present article methods of the descri ption of a security policy are analysed by working out of information-safe technologies of construction of computing systems. The security policy can be developed and described with use formal and with use of an informal method. Merits and demerits of each of methods are revealed. The requirements shown to models of safety are defined.

Keywords: a security policy, the formal and informal descri ption of a security policy, safety model

Editorial office address

Executive Secretary of the Editor’s Office

 Editor’s Office: 40 Lenina Prospect, Tomsk, 634050, Russia

  Phone / Fax: + 7 (3822) 701-582

  journal@tusur.ru

 

Viktor N. Maslennikov

Executive Secretary of the Editor’s Office

 Editor’s Office: 40 Lenina Prospect, Tomsk, 634050, Russia

  Phone / Fax: + 7 (3822) 51-21-21 / 51-43-02

  vnmas@tusur.ru

Subscription for updates