Menu
Home
Contact us
Stats
Categories
Calendar
Toggle Wiki
Wiki Home
Last Changes
Rankings
List pages
Orphan pages
Sandbox
Print
Toggle Image Galleries
Galleries
Rankings
Toggle Articles
Articles home
List articles
Rankings
Toggle Blogs
List blogs
Rankings
Toggle Forums
List forums
Rankings
Toggle File Galleries
List galleries
Rankings
Toggle Maps
Mapfiles
Toggle Surveys
List surveys
Stats
ITHEA Classification Structure > D. Software  > D.4 OPERATING SYSTEMS  > D.4.6 Security and Protection 
INVESTIGATION ON COMPRESSION METHODS USED AS A PROTECTION INSTRUMENT ...
By: Dimitrina Polimirova, Eugene Nickolov (4347 reads)
Rating: (1.00/10)

Abstract: This report examines important issues related to different ways to influence the information security of file objects, subjected to information attacks by the methods of compression. Accordingly, the report analyzes the relationships that may exist between selected set of known by the moment of exploration attacks, methods and objects. A methodology for evaluation of information security of objects exposed to attacks is proposed. This methodology reports the impact of different methods of compression which can be applied to these objects. A coefficient of information security for each relation attack—method—object is created. It depends on two main parameters TIME and SIZE, which describe, respectively, the attack and the object. The parameters are presented as two separate relations variables before and after the impact of methods of compression. Since one object can be processed by more than one method of compression, different criteria and methods are used for evaluating and selecting the best method of compression with respect to the information security of the investigated objects. An analysis of the obtained results is made. On this basis are made recommendations for choosing methods of compression with the lowest risk with respect to the information security of file objects, subjected to information attacks.

Keywords: Information Security, Information Attacks, Methods of Compression, File Objects, Co-efficient of Information Security, Risk Assessment.

ACM Classification Keywords: D.4.6 Security and Protection: information flow controls

Link:

INVESTIGATION ON COMPRESSION METHODS USED AS A PROTECTION INSTRUMENT OF FILE OBJECTS

Dimitrina Polimirova, Eugene Nickolov

http://foibg.com/ijita/vol16/IJITA16-2-p02.pdf

Print
D.4.6 Security and Protection
article: IMPROVING OF EXISTING PERMISSION SYSTEM IN ANDROID OS · PASSIVE STEGANALYSIS OF MULTIDOMAIN EMBEDDING METHODS · CORRELATION-BASED PASSWORD GENERATION FROM FINGERPRINTS · КОСВЕННАЯ СТЕГАНОГРАФИЯ · ANALYSIS OF MALICIOUS ATTACKS ACCOMPLISHED IN REAL AND VIRTUAL ENVIRONMENT · INVESTIGATION ON COMPRESSION METHODS USED AS A PROTECTION INSTRUMENT ... · ANALYSIS OF MALICIOUS ATTACKS ACCOMPLISHED IN REAL AND VIRTUAL ... · ANALYSIS OF INFORMATION SECURITY OF OBJECTS UNDER ATTACKS · CONCEPTUAL MODEL AND SECURITY REQUIREMENTS FOR DRM TECHNIQUES ... · INVESTIGATING THE RELATIONS OF ATTACKS, METHODS AND OBJECTS ... · RESEARCH OF THE INFLUENCE OF METHODS OF COMPRESSION ON ... · VERIFICATION AND APPLICATION OF CONCEPTUAL MODEL AND SECURITY ... · APPLICATION OF METHODS OF MULTI-CRITERIA EVALUATION IN CHOOSING A METHOD ... · THREAT MODEL FOR USER SECURITY IN E-LEARNING SYSTEMS · EXAMINATION OF PASSWORDS’ INFLUATION ON THE COMPRESSING PROCESS ... ·
Login
[ register | I forgot my password ]
World Clock
Powered by Tikiwiki Powered by PHP Powered by Smarty Powered by ADOdb Made with CSS Powered by RDF powered by The PHP Layers Menu System
RSS Wiki RSS Blogs rss Articles RSS Image Galleries RSS File Galleries RSS Forums RSS Maps rss Calendars
[ Execution time: 0.08 secs ]   [ Memory usage: 7.53MB ]   [ GZIP Disabled ]   [ Server load: 0.26 ]
Powered by Tikiwiki CMS/Groupware