KO‘P SATHLI XAVFSIZLIK MODELLARI.
Keywords:
kirish nazorati modeli; Bell-LaPadula modeli; tarqatilgan ma'lumotlar bazalari; rolga asoslangan kirish nazoratiAbstract
Ma'lumotlar xavfsizligi, ruxsatsiz foydalanish, ma'lumotlarni o'zgartirish yoki tarqatish kabi faoliyatlarni oldini olishga qaratilgan harakatlarni o'z ichiga oladi. Bu faqat ma'lumotlarni ushlash sifatida emas, balki yaxlitlik, mavjudlik va maxfiylik kabi muhim jihatlarning buzilishining oldini olish sifatida ham qaralishi kerak. Ushbu uchta asosiy elementdagi har qanday zaiflik ma'lumotlar xavfsizligini buzilish sifatida baholanadi. Ushbu tadqiqotda ko'p darajali kirish nazorati usuli ishlab chiqish maqsadida, yaxshilangan Bell-LaPadula xavfsizlik modeli tarqatilgan tizimlarga qabul qilingan va shuning uchun ma'lumotlar xavfsizligidagi uchta asosiy elementdan biri bo'lgan maxfiylik xususiyatining qanday ta'minlangani ko'rsatilgan. Tadqiqotda taklif qilingan model haqiqiy hayotdan olingan ma'lumotlar klasteriga tatbiq etilgan. Taklif qilingan modelning samaradorligi Rolga Asoslangan Kirish Nazorati va An'anaviy Kirish Nazorati modellari bilan solishtirilgan. Olingan natijalar taqqoslanganda, taklif qilingan model yordamida ma'lumotlar foydalanuvchilar tomonidan yanada xavfsiz va tezkor tarzda taqdim etilgan.
Downloads
References
Andress, J. (2011). *The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice*. Elsevier Inc., USA.
Nemati, H. (2007). *Information Security and Ethics: Concepts, Methodologies, Tools and Applications*. Information Science Reference, USA. https://doi.org/10.4018/978-1-59904-937-3
Whitman, M. E. & Mattord, H. J. (2012). *Principles Of Information Security*. Course Technology, Cengage Learning, USA.
Vijayalakshmi, K. & Javalakshmi, V. (2021). *Shared Access Control Models for Big Data: A Perspective Study and Analysis*. Advances in Intelligent Systems and Computing book series (AISC), 1272, 397-410. https://doi.org/10.1007/978-981-15-8443-5_33
Ghamdi, H. F. & Than, T. (2020). *Information security governance challenges and critical success factors: Systematic review*. Elsevier Computers & Security, 99, 1-39. https://doi.org/10.1016/j.cose.2020.102030
Gunjan, B., Vijayalakshmi, A., Jaideep, V., & Shamik, S. (2019). *Deploying ABAC Policies Using RBAC Systems*. Journal of Computer Security, 27(4), 483-506. https://doi.org/10.3233/JCS-191315