Information security policy in the systems of information and analytical maintenance for support of organizational decisions

S.M. Churubrova

Abstract


This article describes an information security policy in systems of  support of organizational decisions. It defines the basic requirements for the protection of information objects, information resources  and features of functioning Intellectual information technology support organizational decisions are described. The general rules and regulations separation and control access based on ABAC model are developed.

Problems in programming 2016; 4: 97-103


Keywords


information security; security policy; access control; decision support

Full Text:

PDF (Ukrainian)

References


Terminology in the field of information security in computer systems from unauthorized access: RD TPI 1.1-003-99. — K.: SSSCIP of Ukraine, 1999. – 26 p.

Standard provision of security services in automated systems: RD TPI 1.4-001-2000. — K.: SSSCIP of Ukraine, 2000. – 26 p.

Antoniuk A. Security policy information insecure automated systems [In Ukranian] In: Scientific notes NaUKMA. – 2003. – Vol. 21, Computer Science. – P. 102–107.

Power D.J. What is a modern decision support system? [Electronic resource]: article Prof. Daniel J. Power, 27.12.2007. DSSResources.COM

Churubrova S. Substantiation of access control model in the support system of organizational decisions [In Rassian] In: Modern Information Security . – 2015. – N 2. – P. 64–71.

Ilina E.P., Sinitsyn I.P., Yablokova T.L. Designing principles of the Intelligent information technology for organization decisions [In Rassian] In: Problems in programming. – 2015. – N 2. – P. 63–75.

General provisions for the protection of information in computer systems against unauthorized access: RD TPI 1.1-002-99. — K.: SSSCIP of Ukraine, 1999. – 16 p.

Law of Ukraine "On State Secrets" dated 21 January 1994 N 3856-XII // Bulletin of the Supreme Council of Ukraine. – 1994. – N 16. – P. 93.

SR 0112U002763. Research report "Development of methods, technologies and information and analytical support of decision support systems in organizational management" (intermediate) – ISS NASU, 2014. – 141 p.

Xin J. A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC. / Xin Jin, Ram Krishnan and Ravi Sandhu. - 26th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC). – 2012. – P. 41–55.

Hu, Vincent C., D. Richard Kuhn, and David F. Ferraiolo. "Attribute Based Access Control." IEEE Computer 48.2. – 2015. – P. 85–88.


Refbacks

  • There are currently no refbacks.