Attributes | Values |
---|
rdf:type
| |
Description
| - The aim of this paper is the realization of the data security model by using UML and Petri net. The model assumes that the data is stored in the virtualized environment (for mid-range organization) - cloud. The end user has own account and a different law for data security. Data security is consists via seven modules - client, input data, integrity, risk management, account management, sensitive data, monitoring of security. Dependence between modules is represented by use case diagram. In the modules are included risk procedures, security policy and their formation. The solution assumes that each end user, while he has their account own and a different law for data security, he can store data to external media. Simulation of this model is created in the Petri net. When we use simulation, we can follow the progress of data security via modules and changes with data. This model can be implemented in mid-range organization.
- The aim of this paper is the realization of the data security model by using UML and Petri net. The model assumes that the data is stored in the virtualized environment (for mid-range organization) - cloud. The end user has own account and a different law for data security. Data security is consists via seven modules - client, input data, integrity, risk management, account management, sensitive data, monitoring of security. Dependence between modules is represented by use case diagram. In the modules are included risk procedures, security policy and their formation. The solution assumes that each end user, while he has their account own and a different law for data security, he can store data to external media. Simulation of this model is created in the Petri net. When we use simulation, we can follow the progress of data security via modules and changes with data. This model can be implemented in mid-range organization. (en)
|
Title
| - Model of data security for mid-range organizations with using the virtualized environments
- Model of data security for mid-range organizations with using the virtualized environments (en)
|
skos:prefLabel
| - Model of data security for mid-range organizations with using the virtualized environments
- Model of data security for mid-range organizations with using the virtualized environments (en)
|
skos:notation
| - RIV/62156489:43110/13:00209201!RIV14-MSM-43110___
|
http://linked.open...avai/riv/aktivita
| |
http://linked.open...avai/riv/aktivity
| |
http://linked.open...vai/riv/dodaniDat
| |
http://linked.open...aciTvurceVysledku
| |
http://linked.open.../riv/druhVysledku
| |
http://linked.open...iv/duvernostUdaju
| |
http://linked.open...titaPredkladatele
| |
http://linked.open...dnocenehoVysledku
| |
http://linked.open...ai/riv/idVysledku
| - RIV/62156489:43110/13:00209201
|
http://linked.open...riv/jazykVysledku
| |
http://linked.open.../riv/klicovaSlova
| - cloud computing; UML; petri net; data security (en)
|
http://linked.open.../riv/klicoveSlovo
| |
http://linked.open...ontrolniKodProRIV
| |
http://linked.open...v/mistoKonaniAkce
| |
http://linked.open...i/riv/mistoVydani
| |
http://linked.open...i/riv/nazevZdroje
| |
http://linked.open...in/vavai/riv/obor
| |
http://linked.open...ichTvurcuVysledku
| |
http://linked.open...cetTvurcuVysledku
| |
http://linked.open...UplatneniVysledku
| |
http://linked.open...iv/tvurceVysledku
| - Rábová, Ivana
- Priščáková, Zuzana
|
http://linked.open...vavai/riv/typAkce
| |
http://linked.open.../riv/zahajeniAkce
| |
number of pages
| |
http://purl.org/ne...btex#hasPublisher
| - Technická univerzita v Košiciach
|
https://schema.org/isbn
| |
http://localhost/t...ganizacniJednotka
| |