350 rub
Journal Highly available systems №3 for 2016 г.
Article in number:
The security policies for key management subsystems in high availability information technology systems
Keywords:
cryptographic key management subsystems
high availability information technology systems
metadata
confidentiality
integrity
authentication
cryptanalyze
security policy
information management
Authors:
V.I. Budzko - Dr. Sc. (Eng.), Corresponding Member of Academy of Cryptography of RF, Deputy Director of R&D, FRC «Computer Science and Control» RAS (Moscow)
E-mail: vbudzko@ipiran.ru
D.A. Melnikov - Ph. D. (Eng.), Associate Professor, Leading Research Scientist, FRC «Computer Science and Control» RAS (Moscow); Associate Professor, National Research Nuclear University «MEPhI» (Moscow)
E-mail: mda-17@yandex.ru
V.M. Fomichev - Dr. Sc. (Phys.-Math.), Professor, Leading Research Scientist, FRC «Computer Science and Control» RAS (Moscow); Professor, National Research Nuclear University «MEPhI» (Moscow); Professor, Financial University under the Government of the Russian Federation
E-mail: fomichev@nm.ru
Abstract:
Creation and implementation of key management subsystems in high availability information technology systems are discussed. The problems mentioned above are closely associated with the main requirements for design and build of key management subsystems.
Accounting by the developers for these features of security policies is essential for ensuring information security of high availability information technology systems.
Pages: 82-90
References
- Melnikov D.A., Ivanenko V.G., Kondrateva T.A., Melnikov A.D. Prakticheskaja realizacija razlichnykh modelejj infrastruktury otkrytykh kljuchejj // Bezopasnost informacionnykh tekhnologijj. 2016. № 1. S. 100−114.
- Melnikov D.A., Durakovsky A.P., Gorbatov V.S., Ivanenko V.G., Modestov A.A. Russian Model of Public Keys and Validation Infrastructure as Base of the Cloud Trust // Proceedings of the 4th International Conference on Future Internet of Things and Cloud (FiCloud 2016). 2016. P. 123−130.
- Budzko V.I., Melnikov D.A., Fomichev V.M. Bazovye trebovanija k podsistemam obespechenija kriptokljuchami v informacionno-tekhnologicheskikh sistemakh vysokojj dostupnosti // Sistemy vysokojj dostupnosti. 2016. T. 12. № 3. S. 73−81.
- NIST SP 800-130: A Framework for Designing Cryptographic Key Management Systems. August 2013.
- NIST SP 800-57 Part 1 Rev. 4: Recommendation for Key Management. Part 1: General. January 2016.
- ISO. «Information Processing Systems - Open Systems Interconnection Reference Model - Part 2: Security Architecture». ISO/IEC 7499-2.
- ITU-T. «Information technology - Open Systems Interconnection - Security frameworks for open systems: Overview». Recommendation KH.810. 1995.
- Fomichev V.M., Melnikov D.A. Kriptograficheskie metody zashhity informacii (v 2-kh chastjakh): Uchebnik. M.: JUrajjt. 2016.
- Fomichev V.M. Metody diskretnojj matematiki v kriptologii. M.: Dialog-MIFI. 2010. 424 s.
- Alferov A.P., Zubov A.JU., Kuzmin A.S., CHeremushkin A.V. Osnovy kriptografii. M.: Gelios ARV. 2001.