ushbu tezisda tibbiy ilmiy tekshirishlarda ishtirokchilar anonimligi va shaxsiy ma’lumotlarni konfidensialligini ta’minlashdagi muammolar va bu muammolarni hal qilishda blokcheyn texnologiyasi qoʻllash istiqbollari tahlil qilinadi.
24.04.2023 View more DownloadIn this article the methods of access management to data transmission networks (DTN) are considered. Two basic access management mechanisms are conducted: discretionary and mandatory. The basis of the Discretionary Access Control is a matrix of access rights, in the cells of the matrix that contains the access rights of subjects to objects. Also mandatory access management is considered based on the model of the Bell-Lapadul which prohibits the transfer of right access between users. The most widespread protocols to management access to the (DTN) of remote users are protocols RADIUS and TACACS +. The advantages and disadvantages are demonstrated by analyzing of their capabilities.
24.04.2023 View more DownloadThis paper presents the problem of embedding data hashing algorithms into a cryptographic data protection tool. The introduction of data hashing algorithms into a means of cryptographic protection of information is the process of integrating special software modules implementing hashing algorithms into a complex of technical and software tools that are means of cryptographic protection of information. The sequence of the process of the data hashing function with a parameter in the cryptographic data protection tool is schematically described
24.04.2023 View more DownloadIn this paper, presents an overview of the spam filtering process and various spam filtering methods, including their advantages and disadvantages. A multilevel method of spam filtering based on artificial immune system is considered.
24.04.2023 View more DownloadThis work presents an analysis of the algorithm for detecting anomalous situations in the behavior of data leak prevention (DLP) systems after forming a typical (normal) profile of these users by studying the behavior of malicious users on their computers.
23.04.2023 View more DownloadThe use of the S-box is an important component of many symmetric block cipher algorithms used in modern cryptography. However, creating durable S-blocks that can resist various cryptanalysis methods is a complex problem. In this paper, we describe the challenges of achieving randomness and nonlinearity in the design of S-blocks, and the challenges of generating large numbers of these blocks to ensure security. By analyzing these issues, we discussed the challenges of creating robust S-blocks in symmetric block cipher algorithms and the importance of careful design and testing in achieving strong security.
23.04.2023 View more DownloadMaqolada mutaxasislik fanlarida axborot texnologiyalari va ularning didaktik imkoniyatlari hamda ta’lim va tarbiya jarayonlarini raqamli texnologiyalar asosida takomillashtirish ko‘rsatilgan. Zamonaviy axborot texnologiyalarining o‘quv-ta’lim-tarbiya jarayonlariga joriy etilishi va o‘quv ma’lumotlarini taqdim etish va AKTlarning didaktik imkoniyatlari yoritilgan.
23.04.2023 View more DownloadSensitive and confidential data are a requisite for most companies, so protection for this data takes great attention by company's top management, administrators and IT managers. Data leakage causes negative impact on companies. The traditional security approaches, such as firewalls, can't protect data from leakage. Data leakage/loss prevention (DLP) systems are solutions that protect sensitive data from being in non-trusted hands. This paper is an attemptto survey and study DLP systems that will be conducted as well as a comparison with other security and data protection approaches.
23.04.2023 View more DownloadThis article discusses the issues of software algorithms in silkworm breeding for reproductive traits. This software has a mechanism for analyzing the effect of selecting such leading reproductive traits as total number of eggs in a laying, number of normal eggs in a laying, laying weight and weight per egg.
23.04.2023 View more Download