Protection of Valuable Information in Information Technologies
暂无分享,去创建一个
Abstract—This work considers the possibility of recovering valuable information when an intruder knows the results of information conversion and conversion in the framework of some information technology. The forest-type model of processable information is built. Approaches to protecting valuable information are investigated.
[1] W. Ashby. Design for a Brain , 1954 .
[2] Benjamin C. Pierce,et al. A verified information-flow architecture , 2014, J. Comput. Secur..
[3] Alexander A. Grusho,et al. Detection of anomalies in non-numerical data , 2016, 2016 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT).
[4] Alonzo Church,et al. Introduction to Mathematical Logic , 1991 .