Entropy Approach to Modeling Information Security Systems and Processes

One possible approach to modeling the information security processes through the use of physical analogy with the second thermodynamics law is discussed. This approach allows to present an information protection system as a system with maximum utility and to obtain an optimal solution for developing...

Full description

Bibliographic Details
Main Author: A. A. Malyuk
Format: Article
Language:English
Published: Joint Stock Company "Experimental Scientific and Production Association SPELS 2011-12-01
Series:Безопасность информационных технологий
Subjects:
Online Access:https://bit.mephi.ru/index.php/bit/article/view/575
_version_ 1797725060538040320
author A. A. Malyuk
author_facet A. A. Malyuk
author_sort A. A. Malyuk
collection DOAJ
description One possible approach to modeling the information security processes through the use of physical analogy with the second thermodynamics law is discussed. This approach allows to present an information protection system as a system with maximum utility and to obtain an optimal solution for developing its protection on the basis of maximizing its entropy.
first_indexed 2024-03-12T10:25:42Z
format Article
id doaj.art-7eee8204c4c64315b3c5910ba153c011
institution Directory Open Access Journal
issn 2074-7128
2074-7136
language English
last_indexed 2024-03-12T10:25:42Z
publishDate 2011-12-01
publisher Joint Stock Company "Experimental Scientific and Production Association SPELS
record_format Article
series Безопасность информационных технологий
spelling doaj.art-7eee8204c4c64315b3c5910ba153c0112023-09-02T09:44:30ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362011-12-011841519565Entropy Approach to Modeling Information Security Systems and ProcessesA. A. MalyukOne possible approach to modeling the information security processes through the use of physical analogy with the second thermodynamics law is discussed. This approach allows to present an information protection system as a system with maximum utility and to obtain an optimal solution for developing its protection on the basis of maximizing its entropy.https://bit.mephi.ru/index.php/bit/article/view/575information securityutility function of information protection system
spellingShingle A. A. Malyuk
Entropy Approach to Modeling Information Security Systems and Processes
Безопасность информационных технологий
information security
utility function of information protection system
title Entropy Approach to Modeling Information Security Systems and Processes
title_full Entropy Approach to Modeling Information Security Systems and Processes
title_fullStr Entropy Approach to Modeling Information Security Systems and Processes
title_full_unstemmed Entropy Approach to Modeling Information Security Systems and Processes
title_short Entropy Approach to Modeling Information Security Systems and Processes
title_sort entropy approach to modeling information security systems and processes
topic information security
utility function of information protection system
url https://bit.mephi.ru/index.php/bit/article/view/575
work_keys_str_mv AT aamalyuk entropyapproachtomodelinginformationsecuritysystemsandprocesses