KO‘P SATHLI XAVFSIZLIK MODELLARI.

Authors

  • Boltayev Ulug`bek Zafarovich Muhhammad Al-Xoraxmiy nomidagi Toshkent Axborod Texnologiyalari Universiteti Dasturiy injiniringi fakulteti talabasi Author

Keywords:

kirish nazorati modeli; Bell-LaPadula modeli; tarqatilgan ma'lumotlar bazalari; rolga asoslangan kirish nazorati

Abstract

Ma'lumotlar xavfsizligi, ruxsatsiz foydalanish, ma'lumotlarni o'zgartirish yoki tarqatish kabi faoliyatlarni oldini olishga qaratilgan harakatlarni o'z ichiga oladi. Bu faqat ma'lumotlarni ushlash sifatida emas, balki yaxlitlik, mavjudlik va maxfiylik kabi muhim jihatlarning buzilishining oldini olish sifatida ham qaralishi kerak. Ushbu uchta asosiy elementdagi har qanday zaiflik ma'lumotlar xavfsizligini buzilish sifatida baholanadi. Ushbu tadqiqotda ko'p darajali kirish nazorati usuli ishlab chiqish maqsadida, yaxshilangan Bell-LaPadula xavfsizlik modeli tarqatilgan tizimlarga qabul qilingan va shuning uchun ma'lumotlar xavfsizligidagi uchta asosiy elementdan biri bo'lgan maxfiylik xususiyatining qanday ta'minlangani ko'rsatilgan. Tadqiqotda taklif qilingan model haqiqiy hayotdan olingan ma'lumotlar klasteriga tatbiq etilgan. Taklif qilingan modelning samaradorligi Rolga Asoslangan Kirish Nazorati va An'anaviy Kirish Nazorati modellari bilan solishtirilgan. Olingan natijalar taqqoslanganda, taklif qilingan model yordamida ma'lumotlar foydalanuvchilar tomonidan yanada xavfsiz va tezkor tarzda taqdim etilgan.

Downloads

Download data is not yet available.

References

Andress, J. (2011). *The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice*. Elsevier Inc., USA.

Nemati, H. (2007). *Information Security and Ethics: Concepts, Methodologies, Tools and Applications*. Information Science Reference, USA. https://doi.org/10.4018/978-1-59904-937-3

Whitman, M. E. & Mattord, H. J. (2012). *Principles Of Information Security*. Course Technology, Cengage Learning, USA.

Vijayalakshmi, K. & Javalakshmi, V. (2021). *Shared Access Control Models for Big Data: A Perspective Study and Analysis*. Advances in Intelligent Systems and Computing book series (AISC), 1272, 397-410. https://doi.org/10.1007/978-981-15-8443-5_33

Ghamdi, H. F. & Than, T. (2020). *Information security governance challenges and critical success factors: Systematic review*. Elsevier Computers & Security, 99, 1-39. https://doi.org/10.1016/j.cose.2020.102030

Gunjan, B., Vijayalakshmi, A., Jaideep, V., & Shamik, S. (2019). *Deploying ABAC Policies Using RBAC Systems*. Journal of Computer Security, 27(4), 483-506. https://doi.org/10.3233/JCS-191315

https://link.springer.com

Downloads

Published

2024-12-11