Method for Information Security Events Detection in a Cloud Signature Systems
The parameters and mechanisms that can be used as the basis for a method for detecting information security events in cloud signature systems, where the signature activation protocol is used, and the development of such a method are substantiated. The following parameters are proposed: the number of...
Saved in:
| Main Authors: | V. A. Gerasimov, O. V. Boyprav |
|---|---|
| Format: | Article |
| Language: | Russian |
| Published: |
Ministry of Education of the Republic of Belarus, Establishment The Main Information and Analytical Center
2024-06-01
|
| Series: | Цифровая трансформация |
| Subjects: | |
| Online Access: | https://dt.bsuir.by/jour/article/view/851 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Using a Cloud-Based Electronic Signature System for Organizing Electronic Voting
by: V. А. Herasimau, et al.
Published: (2024-03-01) -
Problems of implementing SIEM systems in the practice of managing information security of economic entities
by: V. A. Sizov, et al.
Published: (2020-03-01) -
Integrity checking protocol with identity-based proxy signature in mobile cloud computing
by: Li YAN, et al.
Published: (2015-10-01) -
The Task of Detecting Unacceptable Information Security Events in the Information Infrastructure
by: Darya A. Evdokimova, et al.
Published: (2025-03-01) -
Digital multi-signature scheme based on bilinear pairing
by: Cai-juan ZHANG, et al.
Published: (2016-06-01)