Peculiarities of enciphering methods for informative social networks protection

Author(s) Collection number Pages Download abstract Download full text
Durniak B. V., Khometa T. M. № 1 (69) 60-68 Image Image

Cryptographic methods of access control to complex informative systems using the SPX access control system are under consideration. Performed analysis shows the possibility of SPX protocols modification with the purpose of their adaptation to the requirement of informative social systems. Such adaptation may imply simplification of certain procedures of this protocol stipulated by peculiarities of the social system.

Keywords: informative social systems ICS, verification, identification data, cryptography.


  • 1. Tardo, Zh., & Alladzhepen, K. (1991). SPKh: Globalnaia autentifikatsiia i ispolzovanie obshchestvennykh kliuchevykh svidetelstv. V.: Prodolzhenie 12-ho Simpoziuma ob Issledovaniiakh v oblasti bezopasnosti i konfidentsialnosti, (pp. 261–268) [in Russian].
  • 2. Amorozo, E. (1999). Proiavlenie Intruzii [Wykrywanie Intruzow]. Warshawa: RM [in Polish] .
  • 3. Stolling, V. (2000). Osnovy zashchity setei. Prilozheniia i standarty. Kiev : VKhBb [in Russian].
  • 4. Bendat, J., & Pirson, A. (1989). Prikladnoi analiz sluchainykh dannykh. M. : Mir [in Russian].
  • 5. Yaglom, A. M., & Yaglom, I. M. (1973). Veroiatnost i informatsiia. M.: Nauka [in Russian].
  • 6. Depster, A. (1968). Generalizatsiia Baezianskikh vyvodov. Zhurnal Korolevskogo Statisticheskoho Obshchestva, 30, 205-247.
  • 7. Korolev, V. Yu. (2005). Teoriia veroiatnostei i matematicheskaia statistika M.: Prospekt [in Russian].