Entropy Approach to Modeling Information Security Systems and Processes
One possible approach to modeling the information security processes through the use of physical analogy with the second thermodynamics law is discussed. This approach allows to present an information protection system as a system with maximum utility and to obtain an optimal solution for developing...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Joint Stock Company "Experimental Scientific and Production Association SPELS
2011-12-01
|
Series: | Безопасность информационных технологий |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/575 |
_version_ | 1797725060538040320 |
---|---|
author | A. A. Malyuk |
author_facet | A. A. Malyuk |
author_sort | A. A. Malyuk |
collection | DOAJ |
description | One possible approach to modeling the information security processes through the use of physical analogy with the second thermodynamics law is discussed. This approach allows to present an information protection system as a system with maximum utility and to obtain an optimal solution for developing its protection on the basis of maximizing its entropy. |
first_indexed | 2024-03-12T10:25:42Z |
format | Article |
id | doaj.art-7eee8204c4c64315b3c5910ba153c011 |
institution | Directory Open Access Journal |
issn | 2074-7128 2074-7136 |
language | English |
last_indexed | 2024-03-12T10:25:42Z |
publishDate | 2011-12-01 |
publisher | Joint Stock Company "Experimental Scientific and Production Association SPELS |
record_format | Article |
series | Безопасность информационных технологий |
spelling | doaj.art-7eee8204c4c64315b3c5910ba153c0112023-09-02T09:44:30ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362011-12-011841519565Entropy Approach to Modeling Information Security Systems and ProcessesA. A. MalyukOne possible approach to modeling the information security processes through the use of physical analogy with the second thermodynamics law is discussed. This approach allows to present an information protection system as a system with maximum utility and to obtain an optimal solution for developing its protection on the basis of maximizing its entropy.https://bit.mephi.ru/index.php/bit/article/view/575information securityutility function of information protection system |
spellingShingle | A. A. Malyuk Entropy Approach to Modeling Information Security Systems and Processes Безопасность информационных технологий information security utility function of information protection system |
title | Entropy Approach to Modeling Information Security Systems and Processes |
title_full | Entropy Approach to Modeling Information Security Systems and Processes |
title_fullStr | Entropy Approach to Modeling Information Security Systems and Processes |
title_full_unstemmed | Entropy Approach to Modeling Information Security Systems and Processes |
title_short | Entropy Approach to Modeling Information Security Systems and Processes |
title_sort | entropy approach to modeling information security systems and processes |
topic | information security utility function of information protection system |
url | https://bit.mephi.ru/index.php/bit/article/view/575 |
work_keys_str_mv | AT aamalyuk entropyapproachtomodelinginformationsecuritysystemsandprocesses |