Mironova Valentina Grigorievna
Articles:
- Computer-based system for vetting information system of personal data – «AIST-P»
- Formation of requirements when designing a system to protect confidential information
- Implementation of Take-Grant model as a representation of user access rights differentiation system in the building
- Petri nets, Markov as a tool for creating analytical models for the main types of unauthorized access to the information system
- Pre-project design of personal data information systems as a stage of the information security audit
- The methodology for the analysis of modes of differentiation of user access rights to confidential information and the possibility of unauthorized access
- Threats to information security of confidential information in different contexts of information systems for handling confidential information