Organization of Data Access Based on Binary Rules in an Intelligent Testing System

Authors

  • R. R. Yusupov Kalashnikov ISTU
  • S. V. Vologdin Kalashnikov ISTU
  • A. P. Beltyukov Udmurt State University

DOI:

https://doi.org/10.22213/2410-9304-2017-4-49-54

Keywords:

data confidentiality, IT, data protection, intelligent systems, database, information security

Abstract

In this paper, we consider one of the levels of information security, namely the data access control model, which implements the principle of the system of delineation of rights based on binary rules. Nowadays the relevance of this topic is justified because of need to restrict access to data in any virtually system where there is any organizational structure among users. The purpose of this work is to improve the security of stored data by limiting access to it. The principle of the system is that each user has a right or set of rights that determine the level of access to information for the user. The set of rights is represented in the form of a binary number, where the length of the number is determined by the number of all possible rights. To test this approach for delineation of rights, an intelligent testing system (ITS) was used, in which this approach is presented as one of the ITS modules. The final result of this work is the implementation of the algorithm for providing access to data based on binary rules, which will help to increase the level of security of the system, in which this algorithm will be applied. The presented material will be useful for information security specialists.

Author Biographies

R. R. Yusupov, Kalashnikov ISTU

Master’s Degree Student

S. V. Vologdin, Kalashnikov ISTU

DSc in Engineering, Professor

A. P. Beltyukov, Udmurt State University

DSc (Physics and Mathematics), Professor

References

The state of broadband 2017: broadband catalyzing sustainable development // International Telecommunication Union (ITU). 2017. URL: https:// www.itu.int/dms_pub/itu-s/opb/pol/S-POL-BROAD-BAND.18-2017-PDF-E.pdf (дата обращения: 12.10.2017).

Девянин П. Н. Модели безопасности компьютерных систем. Управление доступом и информационными потоками : учеб. пособие для вузов. М. : Горячая линия - Телеком, 2013. 338 с.

Аванесов В. С. Форма тестовых заданий : учеб. пособие. 2-е изд. М. : Центр тестирования, 2005. 155 с.

Дружинина Е. В., Вологдин С. В. Разработка руководства пользователя информационной системы тестирования школьников // Вестник ИжГТУ имени М. Т. Калашникова. 2015. № 2. С. 86-87.

Sheeri K. Cabral, Keith Murphy. MySQL Administrator's Bible. Indianapolis: Wiley Publishing, 2009. 888 c.

Beaulieu Alan. Learning SQL. Sebastopol: O'Reilly Media, 2009. 312 c.

Published

25.12.2017

How to Cite

Yusupov Р. Р., Vologdin С. В., & Beltyukov А. П. (2017). Organization of Data Access Based on Binary Rules in an Intelligent Testing System. Intellekt. Sist. Proizv., 15(4), 49–54. https://doi.org/10.22213/2410-9304-2017-4-49-54

Issue

Section

Articles