ISSN: 2375-3943
American Journal of Computation, Communication and Control  
Manuscript Information
 
 
Effectiveness of Virtualization Data Protection at Full Priori Sources of Uncertainty
American Journal of Computation, Communication and Control
Vol.4 , No. 3, Publication Date: Sep. 20, 2017, Page: 16-22
915 Views Since September 20, 2017, 520 Downloads Since Sep. 20, 2017
 
 
Authors
 
[1]    

Vladimir Kotenko, South Federal University, Institute of Computer Technologies and Information Security, Taganrog, Russia.

[2]    

Alexander Polyakov, South Federal University, Institute of Computer Technologies and Information Security, Taganrog, Russia.

 
Abstract
 

The results of evaluating the effectiveness of implementation of the new approach to the protection of information resources through virtualization protection process information at full priori sources of uncertainty. Analysis of the results shows that the implementation approach opens up an entirely new realm of possibilities for complex problem solving to increase the resistance of information security, authentication, efficiency, imitoprotection and immunity.


Keywords
 

Information Protection, Virtualization, Cryptogram, The Key Sequence


Reference
 
[01]    

V. V. Kotenko Theory of virtualization and protection of telecommunications: a monograph / Kotenko V. V.- Taganrog: Publishing House of TTI SFU, 2011. -p. 236.

[02]    

V. V. Kotenko, K. E. Rumyantsev The theory of information and protection of telecommunications: a monograph / V. V. Kotenko, K. E. Rumyantsev - Rostov-on-Don: Publishing House of the SFU, 2009. -p. 369.

[03]    

V. V. Kotenko, K. E. Rumyantsev, S. V. Kotenko “New Approach to Evaluate the Effectiveness of the Audio Information Protection for Determining the Identity of Virtual Speech Images”. Proc. of the Second International Conference on Security of Information and Networks. The Association for Computing Machinery (ACM). New York. Publications Dept., ACM, Inc. 2009, pp. 235-239.

[04]    

V. V. Kotenko The decision of the telecommunications protection tasks at full priori source of uncertainty // Proceedings of the XI International Scientific and Practical Conference "Information Security". Part 1 - Taganrog: Publishing House of TTI SFU, 2010. pp. 172-177.

[05]    

V. V. Kotenko The theoretical justification of virtual assessments of protected telecommunications // Proceedings of the XI International Scientific and Practical Conference "Information Security". Part 1 - Taganrog: Publishing House of TTI SFU, 2010. pp. 177-183.

[06]    

V. V. Kotenko, S. V. Kravtsov Methods of synthesizing potentially protected geoinformation technologies // Information countering threats of terrorism: Scientific and practical journal. 2010, №15. pp. 53-62.

[07]    

V. V. Kotenko, K. E. Rumyantsev, А. S. Evseev Technology of using the adaptive virtual coding in discrete information protection task // Proc of the international scientific conference “Modern materials and technical solutions”, Italy, Sicily, 2007. pp. 132-139.

[08]    

V. V. Kotenko, A. R. Kertiev. A model of the encryption algorithm with virtualization estimates // International Journal of Experimental Education, 2015. № 8-3. pp. 411-412.

[09]    

S. V. Kotenko, V. V. Kotenko The method of identification analysis of the processes of noise-immune encoding in coding for continuous channels // Informational counteraction to terrorism threats. 2013. № 20. pp. 151-157.

[10]    

V. V. Kotenko Information quality assessment of communication // Information counteraction to terrorism threats, 2007. № 9. pp. 50-55.





 
  Join Us
 
  Join as Reviewer
 
  Join Editorial Board
 
share:
 
 
Submission
 
 
Membership