COMBINED PROTECTION OF SOFTWARE FROM UNAUTHORIZED MODIFICATIONS
Annotation
An approach is proposed to creation of a combined mechanism of software protection against unauthorized changes on the base of remote confidence principles. The approach ensures a compromise between the summarized protection level and the mechanism scalability.
Keywords
Постоянный URL
Articles in current issue
- INTERDISCIPLINARY APPROACH TO ESTIMATION AND ANALYSIS OF INFORMATION TECHNOLOGIES AND SYSTEMS EFFICIENCY
- PROSPECTIVE CHARACTERISTICS OF DIGITAL DATA TRANSMISSION CHANNEL
- AUTOMATED SYSTEM FOR INFORMATION SUPPORT OF DECISION MAKING IN REALTIME CONTROL OVER SPACE ROCKET TECHNIQUE STATE
- APPLICATION OF WEB-SERVICES TO MEDICAL DIAGNOSIS
- INVESTIGATION ON SAFETY OF COMPLEX TECHNICAL OBJECTS
- APPLICATION OF GEOINFORMATION TECHNOLOGIES TO RISK ASSESSMENT OF DISASTROUS EFFECTS
- COMBINED PROTECTION OF SOFTWARE FROM UNAUTHORIZED MODIFICATIONS
- INVESTIGATION OF BOTNETS AND DEFENSE MECHANISMS ON THE BASE OF SIMULATION MODELING
- POLYMODEL DESCRIPTION OF INHERENT INFORMATION SYSTEM MODERNIZATION PROCESS ON THE BASE OF SERVICE-ORIENTED APPROACH
- METHOD OF TRAFFIC ROUTING IN INFORMATION-COMMUNICATION HETEROGENEOUS NETWORK
- OPTIMIZATION OF QUEUEING NETWORK PARAMETERS ON THE BASE OF COMBINED APPLICATION OF ANALYTICAL AND SIMULATION MODELS
- FORMULATION OF THE PROBLEM OF PLAN OPERATION CORRECTION OF CORPORATIVE INFORMATION SYSTEM WITH THE USE OF POSITION OPTIMIZATION METHOD
- METHOD OF COORDINATION FOR CORPORATIVE INFORMATION SYSTEM ELEMENTS
- APPLICATION OF MULTIAGENT APPROACH TO BIOLOGICAL RESOURCE MODELING