Alternative mechanisms for information security

  • Authors:
  • Alexander Grusho;Nick Grusho;Elena Timonina

  • Affiliations:
  • Institute of Informatics Problems, RAS, Moscow, Russia;Institute of Informatics Problems, RAS, Moscow, Russia;Institute of Informatics Problems, RAS, Moscow, Russia

  • Venue:
  • MMM-ACNS'12 Proceedings of the 6th international conference on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

The usage of doubtful data for information protection is considered. It is shown that by means of unauthenticity it is possible to protect confidentiality, integrity and availability. The basic methods of usage of unauthenticity are mentioned. We introduce the mathematical models and present estimations of quality for information protection with help of injection of unreliable information.