2016 XIX IEEE International Conference on Soft Computing and Measurements (SCM) 2016
DOI: 10.1109/scm.2016.7519715
|View full text |Cite
|
Sign up to set email alerts
|

Issues of information security control in virtualization segment of company information system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 1 publication
0
8
0
Order By: Relevance
“…Papers [16,17] indicated that the existing standards in the field of IS management do not form specific approaches to managing the cyberptotection of OBI, and it complicates procedures of designing the employable software products that would allow adequate assessment of the degree of OBI.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
See 4 more Smart Citations
“…Papers [16,17] indicated that the existing standards in the field of IS management do not form specific approaches to managing the cyberptotection of OBI, and it complicates procedures of designing the employable software products that would allow adequate assessment of the degree of OBI.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…where B j are the business processes of an enterprise; INF j is the set of types of information arrays (IM); RES j are the resources of OBI ICS; VUL j is the set of vulnerabilities of OBI; U j is the set of OBI ICS users; COM j is the set of information flows of OBI; j r D is the set of states of OBI; j=1,2,...,w. Based on the principles of control under conditions of uncertainty [5,9,16,17] and the selected model of threats (1), we propose a generalized architecture of IPCS and CS, Fig. 1.…”
Section: Architecture Of Information Protection Control Systemmentioning
confidence: 99%
See 3 more Smart Citations