Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

    Ludmila Fedorchenko

    Reliable verification of compliance with information security requirements when exchanging data on the Internet is an urgent task. Information is transferred through interaction protocols that are being constantly updated and changed.... more
    Reliable verification of compliance with information security requirements when exchanging data on the Internet is an urgent task. Information is transferred through interaction protocols that are being constantly updated and changed. Methods for verifying the compliance of new protocols with safety requirements are practically significant. Among compliance verification methods, an important place belongs to formal methods based on the study of adequate protocol models and software that implements these protocols. Such methods are known as symbolic protocol verification methods. The article describes a method for symbolic verification of such protocols. The advantage of the proposed method is the comparative simplicity and straightforwardness of the verification process achieved due to the expressive power of the used behavior specification language. The protocol specification uses the model of interacting automaton objects. The language used is CIAO (Cooperative Interaction of Automata Objects). Verification is considered using the TLS (Transport Level Security) handshake protocol as an example.
    This paper proposes an approach of computer network state assessment according to different criteria. Various state evaluation methods are considered. Roles of methods and ways of their application are shown.
    Significant weight of subjective models used in the systems analysis is discussed. It reduces degree of correctness (coherence and completeness) of planning and managerial decisions as results of the systems analysis in the production... more
    Significant weight of subjective models used in the systems analysis is discussed. It reduces degree of correctness (coherence and completeness) of planning and managerial decisions as results of the systems analysis in the production sphere and causes costs of production in the decisions realization. That is why a methodological basis for decision-makers objectifying the systems analysis results is so urgent. It is based on the original system-goal approach, logical and linguistic models of goals, semantic model of structure of goals and semiotic model of reasoning about goals. Three main tasks for objectifying the results of systems analysis are set. Schemes, the main procedures, instructions and examples for the task solution are given.
    Event-driven software systems, belonging to the class of systems with complex behavior in the scientific literature, are reactive systems, which react to the same input effect in different ways depending on their state and background. It... more
    Event-driven software systems, belonging to the class of systems with complex behavior in the scientific literature, are reactive systems, which react to the same input effect in different ways depending on their state and background. It is convenient to describe such systems using state-transition models utilizing special language tools, both graphical and textual. Methodology for automated development of systems with complex behavior using the designed CIAO language (Cooperative Interaction of Automata Objects), which allows formally specifying the required behavior based on an informal description of the reacting system, is presented. An informal description of a reacting system can be provided verbally in a natural language or in another way adopted in a specific domain. Further, according to this specification in the CIAO language, a software system for interacting automata in the C++ programming language is generated with a special system. The generated program implements a be...
    Security means for shared computer, networking, and information resources are not balanced, inefficient, and poorly integrative. This chapter gives a brief overview of certain discrepancies and incompletenesses of ISO standards ISO 15408,... more
    Security means for shared computer, networking, and information resources are not balanced, inefficient, and poorly integrative. This chapter gives a brief overview of certain discrepancies and incompletenesses of ISO standards ISO 15408, ISO 18045, ISO 27k, etc., which are not balanced. Formal methods for their harmonization and coordination are described. Then the chapter discusses Hybrid Ontology Technology using Unified Modeling Language, State Transitions Model (state machine diagrams), and a special tool based on Equivalent Transformations of syntax graph-scheme.
    In this paper we give a brief overview certain discrepancy and incompleteness of ISO standards, that is the complex of regulating documents (ISO 15408, ISO 18045, ISO 27k etc) which are not balanced. Then we described the formal methods... more
    In this paper we give a brief overview certain discrepancy and incompleteness of ISO standards, that is the complex of regulating documents (ISO 15408, ISO 18045, ISO 27k etc) which are not balanced. Then we described the formal methods for their harmonization and coordination. We propose both ontology based method using UML and traditional syntax-oriented approach applied to high level
    Regularization of translational context-free grammar via equivalent transformations is a mandatory step in developing a reliable processor of a formal language defined by this grammar. In the 1970-ies, the multi-component oriented graphs... more
    Regularization of translational context-free grammar via equivalent transformations is a mandatory step in developing a reliable processor of a formal language defined by this grammar. In the 1970-ies, the multi-component oriented graphs with basic equivalent transformations were proposed to represent a formal grammar of ALGOL-68 in a compiler for IBM/360 compatibles. This paper describes a method of grammar regularization with the help of an algorithm of eliminating the left/right-hand side recursion of nonterminals which ultimately converts a context-free grammar into a regular one. The algorithm is based on special equivalent transformations of the grammar syntactic graph: elimination of recursions and insertion of iterations. When implemented in the system SynGT, it has demonstrated over 25% reduction of the memory size required to store the respective intermediate control tables, compared to the algorithm used in Flex/Bison parsers.
    The article proposes an enhanced behavior model using graphs of state transitions. The properties and advantages of the proposed model are discussed, UML-based Cooperative Interaction of Automata Objects (CIAO) language is described,... more
    The article proposes an enhanced behavior model using graphs of state transitions. The properties and advantages of the proposed model are discussed, UML-based Cooperative Interaction of Automata Objects (CIAO) language is described, attribute approach on its parsing mechanism is introduced. The proposed model for describing behavior is aimed at achieving higher reliability and productivity indicators when designing the secure architecture and implementing reactive and distributed systems in comparison with traditional methods. A side-by-side goal is to create a convenient publication language for describing parallel algorithms and distributed reactive systems. The offered model has advantages under certain conditions in comparison with other models of behavior description in the field of the description of asynchronous distributed reacting systems.
    The article considers an example of an adaptive protection system focused on protection from heterogeneous misinforming impacts to computer networks. The system adaptation to the current conditions is being performed by means of its... more
    The article considers an example of an adaptive protection system focused on protection from heterogeneous misinforming impacts to computer networks. The system adaptation to the current conditions is being performed by means of its reconfiguring. Reconfiguring implies adjusting particular blocks of the system to the current situation, as well as selecting appropriate methods of revealing false information in heterogeneous data. Reconfiguring is based on the automata objects model. As an example, data exchange TLS protocol is considered.