Articolul precedent |
Articolul urmator |
646 15 |
Ultima descărcare din IBN: 2022-08-25 01:08 |
Căutarea după subiecte similare conform CZU |
004.056.5 (147) |
Computer science and technology. Computing. Data processing (4182) |
SM ISO690:2012 PILYUGIN, Pavel. Problem of the Boundaries Determining in the Information Space. In: Information Technologies, Systems And Networks, 17-18 octombrie 2017, Chisinau. Chisinau: Editura ULIM, 2017, Volumul 1, pp. 176-181. ISBN 978-9975-45-069-0. |
EXPORT metadate: Google Scholar Crossref CERIF DataCite Dublin Core |
Information Technologies, Systems And Networks Volumul 1, 2017 |
||||||
Conferința "Information Technologies, Systems And Networks" Chisinau, Moldova, 17-18 octombrie 2017 | ||||||
|
||||||
CZU: 004.056.5 | ||||||
Pag. 176-181 | ||||||
|
||||||
Descarcă PDF | ||||||
Rezumat | ||||||
The article deals with the problem of defining areas of cyberspace where the state has the right to apply various methods of protection. The "digital border" is a key concept for ensuring "digital sovereignty". The "digital border" is also a necessary condition for ensuring "digital sovereignty". Different definitions of the "digital boundary" are considered in the article. For each type of "digital boundaries", the reasons for their occurrence, the technical and technological methods for their construction, and the effectiveness for ensuring "digital sovereignty" are described. Providing "digital sovereignty" involves using of authentication, authorization and audition. All these functions are used differently for various types of "digital" boundaries. A model of a distributed multi-level digital boundary is proposed. This model supposes the control of information flows at all levels of cyberspace. Technical and economic constraints are proposed to be solved through the distribution of information flow control functions over the network. Technological basis of such digital boundary can be made by software-defined networks, which allow to concentrate all tasks of analysis and network management in one center. Moreover, information collected in that center can be used during investigations of various incidents if they fall within the sphere of state responsibility. |
||||||
Cuvinte-cheie digital, sovereignty, border, autonomous, system, distributed, multi-level, boundary |
||||||
|