L. Ptitsyna, Anastasia O. Zharanova, M. P. Belov, A. V. Ptitsyn
{"title":"分布式复杂信息安全系统的软体系结构控制","authors":"L. Ptitsyna, Anastasia O. Zharanova, M. P. Belov, A. V. Ptitsyn","doi":"10.1109/CTS53513.2021.9562778","DOIUrl":null,"url":null,"abstract":"The article discusses the actual grounds for the development of soft architectures of distributed complex information security systems. The innovative principles of organizing soft architectures of distributed complex information security systems are formulated. Alternatives of classes of formal descriptions of subsystems of distributed complex information security systems are given. Formalisms for end-to-end linking of different classes of descriptions are proposed. The target landmarks of soft architecture management have been profiled. The support basis for the components of controlled soft architectures is highlighted. The mathematical apparatus for the formation of key elements of the selected reference basis of the components is presented. The developed software for managing the soft architecture of distributed complex information security systems is described.","PeriodicalId":371882,"journal":{"name":"2021 IV International Conference on Control in Technical Systems (CTS)","volume":"13 5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Control of Soft Architecture of Distributed Complex Information Security Systems\",\"authors\":\"L. Ptitsyna, Anastasia O. Zharanova, M. P. Belov, A. V. Ptitsyn\",\"doi\":\"10.1109/CTS53513.2021.9562778\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The article discusses the actual grounds for the development of soft architectures of distributed complex information security systems. The innovative principles of organizing soft architectures of distributed complex information security systems are formulated. Alternatives of classes of formal descriptions of subsystems of distributed complex information security systems are given. Formalisms for end-to-end linking of different classes of descriptions are proposed. The target landmarks of soft architecture management have been profiled. The support basis for the components of controlled soft architectures is highlighted. The mathematical apparatus for the formation of key elements of the selected reference basis of the components is presented. The developed software for managing the soft architecture of distributed complex information security systems is described.\",\"PeriodicalId\":371882,\"journal\":{\"name\":\"2021 IV International Conference on Control in Technical Systems (CTS)\",\"volume\":\"13 5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-09-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IV International Conference on Control in Technical Systems (CTS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CTS53513.2021.9562778\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IV International Conference on Control in Technical Systems (CTS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CTS53513.2021.9562778","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Control of Soft Architecture of Distributed Complex Information Security Systems
The article discusses the actual grounds for the development of soft architectures of distributed complex information security systems. The innovative principles of organizing soft architectures of distributed complex information security systems are formulated. Alternatives of classes of formal descriptions of subsystems of distributed complex information security systems are given. Formalisms for end-to-end linking of different classes of descriptions are proposed. The target landmarks of soft architecture management have been profiled. The support basis for the components of controlled soft architectures is highlighted. The mathematical apparatus for the formation of key elements of the selected reference basis of the components is presented. The developed software for managing the soft architecture of distributed complex information security systems is described.