<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Decentralized Access Demarcation System Construction in Situational Center Network</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Borys Grinchenko Kyiv University</institution>
          ,
          <addr-line>18/2 Bulvarno-Kudriavska str., Kyiv, 04053</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>DTEK Service Ltd.</institution>
          ,
          <addr-line>57 L. Tolstogo str., 01032, Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Institute of Mathematical Machines and Systems Problems of the National Academy of Sciences of Ukraine</institution>
          ,
          <addr-line>42 Ac. Glushkov ave., 03680, Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>197</fpage>
      <lpage>206</lpage>
      <abstract>
        <p>Although there is an understanding in the computer community of the need to improve the cyber protection of the information sector of critical infrastructure and the awareness of the urgent need to implement the best practical and theoretical developments in this area is growing rapidly, the total number of incidents in cyberspace is not significantly decreasing, and the urgency of the search for new technological solutions is only increasing. Without exaggeration, it can be stated that a critically important component of the information protection system is its component-the system of delimiting the access of subjects to the objects of the computer system. In many cases, modern demarcation subsystems are built based on a centralized approach to information security management. This article proposes and justifies a partially decentralized approach to building an information security management system and delimiting access in computer systems so that future security measures can rest on a reliable foundation.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Information security policy</kwd>
        <kwd>cyber defense</kwd>
        <kwd>access control system</kwd>
        <kwd>secret distribution</kwd>
        <kwd>block cipher</kwd>
        <kwd>perfect cipher</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>First, it seems appropriate to pay attention to the fact that the object of the research is a network of
situational centers, which combines several structures—mainly equal partners, the purpose of which
cooperation in the information field is the formation of balanced management decisions regarding the
adoption of adequate measures in specific crises [1]. At the same time, system users, in contrast to the
methods of ensuring integrity or availability, may have their unique requirements for ensuring the
confidentiality of the information resources created by them due to the specifics of the methods of
obtaining preliminary information and/or methods of their further processing, their own “know-how”
and/or copyright for some products, etc. [2–4].</p>
      <p>Many scientific studies have been devoted to the problems of building access demarcation systems
(ADS). In particular, [5–7] provides a systematic review and analysis of the construction of existing and
prospective models. However, their effectiveness in ensuring the confidentiality of information
resources is not defined.</p>
      <p>In [8], partial indicators of effectiveness are proposed to implement the procedure for evaluating the
effectiveness of the system of information protection and cyber security of objects of critical information
infrastructure.</p>
      <p>In [9], the expansion of access control mechanisms in a specific class of sensitive information
systems is investigated.</p>
      <p>It should be noted that these studies are mainly based on the centralized principle of information
security management, when the owner of the system or its manager, by the requirements of regulatory
acts and standards [10–12], the procedure for accessing information and the requirements for the
architecture of the ADS.</p>
      <p>In contrast to the mentioned approach to the construction of a centralized access management system
(CAMS), another approach is developing—decentralized [13, 14], which provides the opportunity to
delegate part of the powers from the central level of security management to other components of the
security system. Namely, in these works, the issue of building a system of access demarcation and a
new approach to their architecture will be considered.</p>
      <p>This approach consists of placing the element responsible for making decisions about allowing or
denying subjects access to objects outside the workstation at which access is restricted. This item resides
on another workstation and can be used to restrict access across multiple machines. This approach is
called “decentralization of the access delimitation system,” considering that the system is divided into
several components installed on different workstations.</p>
      <p>The proposed article provides a concrete solution to the partial decentralization of the access
demarcation system based on an evidence-based approach to information security guarantees [15, 16].</p>
    </sec>
    <sec id="sec-2">
      <title>2. Problems of CAMS and the Way of Their Solution</title>
      <p>As mentioned above, the cyber protection complexes of modern information systems (IS) are mainly
built according to the principle of centralized security management, which provides for the presence of
single management in the system, directed by the owner or manager of the information system. In the
future, referring to the system's owner, we will understand that the relevant provisions also apply to its
administrator. The corresponding security model is shown in Fig. 1.</p>
      <p>This model includes a conditionally single administrator A, who forms and implements the
information security policy (ISP), which is approved by the management of the organization - the owner
of the system, and also configures the components of the cyber protection system and monitors the
implementation of measures that are provided by the ISP and regulatory documents [10] . Information
system users  1,  2, … ,   following the rules defined by the ISP, interact with IS to gain access to
information resources  1,  2, … ,   that are necessary for solving certain problems. As a rule, users
do not participate in forming ISP and configuring security measures, including the access control
system.</p>
      <p>The advantages of this approach to building an information security management system are:
 Unification of protection requirements for all system components.
 Reducing the risk of formation of relatively weak links or vulnerabilities.
 A single vertical of management and control of delimitation of access to information system
resources.</p>
      <p>At the same time, this approach is not free from some disadvantages, namely:
 Potentially, a security system administrator, thanks to too much authority, can personally gain
access to the contents of confidential information resources or, without sufficient grounds, grant
access to a particular user of the system.
 In the case of overcoming protective barriers, for example, in case of abnormal functioning of the
protection system, the attacking party may attempt unauthorized access to an insufficiently
protected resource.
 There is a potential danger of copying and unauthorized distribution by insiders of open resources
that were created at the expense of the owner and users of the system or are subject to copyright.</p>
      <p>It should also be noted that in information systems that combine several different corporate
subsystems, in general, a user can act in one or two guises: as the owner of an information resource and
as a consumer of the resource (client/utilizer).</p>
      <p>At the same time, taking into account the potentially sensitive nature of the method or method of
obtaining or collecting (receiving) the original information that forms the information resource, its
owner may have legal grounds for approval or restriction of access to consumers (clients) to it, and can
also provide suggestions regarding ISP to the system as a whole and perform security administration of
its segment and control its status.</p>
      <p>A similar situation, in particular, can be observed in the network of situational centers of state bodies.</p>
      <p>The model of a partially decentralized security system in a protected IS, which considers the
corresponding shortcomings of a centralized system, is shown in Fig. 2.</p>
      <p>In this model, the management of the central segment of the network still plays a crucial role in
organizing and ensuring security. However, unlike in the previous case, the owner   set of information
resources Ω = {  1,   2, … ,   } acquire the authority to coordinate access to them by other users of
the information system and to provide proposals for the formation of ISP.</p>
      <p>Obviously, we have
⋃Ω
 = {  1, 
2, … ,   },  ℎ
Ω ⋂Ω
= ∅ для  ≠  .</p>
      <p>Let us call a two-row table the descriptor of data belonging to their owners, the upper row of which
is the user number of the IS, and the lower row is the set of information resources corresponding to it
 
= (
1
Ω1
2
Ω
2
…
…

Ω

).</p>
      <p>Based on the ownership descriptor, security management should form access matrices and markers
of the owners of folders and data files for the combined matrix—mandate access demarcation system—
MADS. MADS must contain the Resource’s Owner Unique Number (RWUN) and the resource's
confidentiality code—CC. For example, CC = 0 may indicate that the resource can be available to any
identified and authenticated user of the system, CC = 1 may indicate certain restrictions on the use of
the resource, etc.
mode [17] using a key file generated by the owner k.</p>
      <p>Building a mechanism for delimiting access is based on applying cryptographic transformations of
information. For this purpose, each file transferred to the single database of the information system is
encrypted using an approved block cryptographic algorithm   ( ) in ECB (Electronic Codebook)</p>
      <p>The secret distribution procedure [17, 18] between interested parties of the information system is
used to decrypt files. The file owner securely stores the key and never circulates it publicly on the
network. Next, we will consider the mathematical foundations of the proposed secret distribution
mechanism.</p>
      <p>,
 ̅1 ⨁ … ⨁  ̅ = 0̅,
 ̅ 1
⨁ … ⨁  ̅

≠ 0̅,
where are binary vectorsαi,  ̅ ,  ̅,  ̅ ∈  2 ,  = ̅1̅,̅̅,  2 is vector space of dimension n over a
field of two elements. Here and further, the operation ⨁ means coordinate-by-coordinate addition of
vectors modulo 2 (exclusive OR). If there is equality
where 0̅ is a vector, all coordinates of which are equal to zero, and the condition is fulfilled
of an odd  vector  ̅ is uniquely calculated by expression
where 
&lt;  and the elements of the index set { 1, … ,   } pairwise do not coincide, then in the case
̅ =  1̅⨁ … ⨁  ̅.</p>
      <p>
        In the case of a doubles, the result of the addition in (
        <xref ref-type="bibr" rid="ref4">4</xref>
        ) is equal to 0.
      </p>
      <p>
        The conclusion of the statement is easy to prove by adding equations in the system (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ).
      </p>
      <p>Vectors from the set { ̅1,  ̅2, … ,  ̅ } will be called masks of the secret parameter (key)  ̅.
̅1̅,̅̅ have a random uniform distribution, i.e.</p>
      <p>
        Statement 2. If in the system of equations (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ), the components of vectors  ̅ = (  1, … ,   ),  =
 ( 
= 1) =  ( 
= 0) = 0.5, 
∀  , 
random uniform distribution
and do not depend on  ̅, then the components of the vectors  ̅= (  1, … ,   ),  = ̅1̅,̅̅ also have a
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Mathematical Principles of Secret Distribution Procedure</title>
      <p>Let us formulate some necessary mathematical propositions to substantiate the proposed remote
distribution procedure.</p>
      <p>
        Statement 1. Let the system of linear equations be given
(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
(
        <xref ref-type="bibr" rid="ref4">4</xref>
        )
(
        <xref ref-type="bibr" rid="ref5">5</xref>
        )
(
        <xref ref-type="bibr" rid="ref6">6</xref>
        )
(
        <xref ref-type="bibr" rid="ref7">7</xref>
        )
(
        <xref ref-type="bibr" rid="ref8">8</xref>
        )
(
        <xref ref-type="bibr" rid="ref9">9</xref>
        )
(
        <xref ref-type="bibr" rid="ref10">10</xref>
        )
(
        <xref ref-type="bibr" rid="ref11">11</xref>
        )
(
        <xref ref-type="bibr" rid="ref12">12</xref>
        )
 ( 
= 1) =  ( 
= 0) = 0.5, 
∀  ,  .
      </p>
      <p>Indeed, the probability that some component   = 1 is equal to
 ( 
 ( 
= 1) = 1 −  (</p>
      <p>= 0) =  (  ⨁   ) = 1 =
= 0) ⋅  (  = 1) +  (</p>
      <p>= 1) ⋅  (  = 0) =</p>
      <p>0.5 ⋅  (  = 1) + 0.5 ⋅  (  = 0) = 0.5 ⋅ ( (  = 1) +  (  = 0)) = 0.5.
then each equation
with equal probability at random from the vector space  2 , i.e.</p>
      <p>Statement 3. If, under the conditions of statements 1 and 2, binary vectors { ̅1,  ̅2, … ,  ̅ } are chosen
 ( ̅ =  ̅) = 2−</p>
      <p>
        ∀  ̅∈  2 ,  = ̅1̅,̅̅,
 ̅=  ̅ ⨁  ̅ , 
∀ = ̅1̅,̅̅
specifies a perfect cipher, and (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) determines the distribution of the secret key  ̅ ↔ { 1̅,  2̅, …  ̅} among
the community of  users, and (
        <xref ref-type="bibr" rid="ref6">6</xref>
        ) establishes the secret key recovery rule.
      </p>
      <p>Recall that according to [16] , when random variables  ,  , 
take the value from  2 , and the
perfect cipher if the equality holds:
reflection  ( ,  ) =  :  2 ×  2 →  2 is bijective for any fixed value  , then it  ( ,  ) is called a
 ( ) =  (</p>
      <p>⁄ ) для ∀  .</p>
      <p>This means that guessing the value of the secret K does not depend on whether we know the
corresponding value of B or not.</p>
      <p>Note that according to the definition of conditional probability [19] holds
 ( ,  ) =  ( ) ∙  (
 ⁄ ) =  ( ) ∙  (</p>
      <p />
      <p>⁄ ).</p>
      <p>
        Proceeding from (
        <xref ref-type="bibr" rid="ref11">11</xref>
        ) and (13) based on the approach [20], we have
From the last expression and based on (13)
 ( ,  ) =  ( ) ∙  ( ⁄ ) =  ( ) ∙  ( ⨁ ) =  ( ) ∙  ( ) =  ( ) ∙ 2− .
 (
 ⁄ ) =

 ( ,  )
⁄
 ( )
= 2− .
      </p>
      <p>Bayes’ theorem [19] we have
 ( ⁄ ) =
 ( ) ∙  ( ⁄ )
 ( )
=</p>
      <p>( ) ∙  ( ⁄ )
∑ ( ̅) ∙  ( ⁄ )

̅
=</p>
      <p>( ) ∙ 2−
2− ∙ ∑ ( ̅)
=  ( ).
for a perfect cipher holds.
selection of mask values from the general population, since</p>
      <p>
        In the last expression, the sum is calculated over all possible values of the secret parameter  ̅.
Thus, regardless of the probability distribution of the random variable K, Shannon’s condition [16]
At the same time, it should be noted that condition (
        <xref ref-type="bibr" rid="ref4">4</xref>
        ) contradicts the requirement of independent
 ̅1 ⨁ … ⨁  ̅ −1 =  ̅ .
      </p>
      <p>But this situation should be compensated by reliable and safe storage of a full set of masks
{ ̅1,  ̅2, … ,  ̅ }.</p>
      <p>
        In addition, condition (
        <xref ref-type="bibr" rid="ref5">5</xref>
        ) slightly narrows the set of different admissible sets of masks
{ ̅1,  ̅2, … ,  ̅ }, which is of minor importance from the point of view of security in the case of
sufficiently large n. It is easy to see that the number of checks   condition (
        <xref ref-type="bibr" rid="ref5">5</xref>
        ) is evaluated as
 
=
 −1
∑   
 =2
=
      </p>
      <p>∑   
 =0
−   0 −   1 −    = 2
 −  − 2.</p>
      <p>
        In particular, Table 1 shows the calculated values   for really applicable values.
Number of checks   conditions (
        <xref ref-type="bibr" rid="ref5">5</xref>
        )
      </p>
      <sec id="sec-3-1">
        <title>Method</title>
        <p>Identification
sessions
s = 3
3
3
s = 5
25
10
s = 7
119
21
s = 9
501
36
s = 11
2035
55
(13)
(14)
(15)
(16)
(17)
(18)</p>
        <p>In particular, in the case of length  = 128 binary key  ̅ their total number is 2128 ≈ 1037, at the
same time  =11 is the number   = 2035 &lt; 104.</p>
        <p>
          Also, condition (
          <xref ref-type="bibr" rid="ref5">5</xref>
          ) can be somewhat simplified by applying the condition  ̅ ≠ 0̅, for ∀ = ̅1̅,̅̅.
        </p>
        <p>Note that in the event of an increase in the number of parties to the distribution of the secret s the
number of party identification sessions is rapidly increasing, which increases the total time of the
consumer’s access to the necessary information resource, and this can significantly affect the
responsiveness of the information system as a whole to emergencies.
4. Construction Mechanism of Access Distribution based on Secret Distribution</p>
        <p>Taking into account the fact that the number of secret sharing participants  must be an odd number,
considering the complexity of communications in overloaded systems, and based on the roles of
participants in information exchange, it is suggested to choose the value of  = 3.</p>
        <p>Namely, it is advisable to define the following roles: the security administrator of the central network
segment А, the owner of the information resource В, and the consumer of resource С (Fig. 3).</p>
        <p>If necessary, for some systems, the number of different roles can be increased to  = 5, in the case
of connecting additional categories of control in state systems.</p>
        <p>
          A separate file encryption key and a corresponding set of key masks { ̅ ,  ̅ ,  ̅ } that meet
conditions (
          <xref ref-type="bibr" rid="ref4">4</xref>
          ), (
          <xref ref-type="bibr" rid="ref5">5</xref>
          ), (
          <xref ref-type="bibr" rid="ref7">7</xref>
          ), and (
          <xref ref-type="bibr" rid="ref10">10</xref>
          ) are generated randomly [21] for each confidentiality code CCj.
        </p>
        <p>Formed parts of the secret  ̅ → { ̅ ,  ̅ ,  ̅ } using standard cryptographic protocols are sent by
the owner to the administrator and the consumer. In Fig. 3, this transmission is shown by dashed lines.
Solid lines show requests - responses sent by the participants of the information exchange to each other,
in particular, within the framework of identification and authentication protocols.</p>
        <p>After the distribution of parts of the secret, the need for their complete set { ̅ ,  ̅ ,  ̅ } is lost. In
order to ensure the security of the proposed scheme, this set must be destroyed. In case of accidental
loss of a single part or suspicion of its compromise, a new set of parts must be generated and distributed.</p>
        <p>Table 2 shows the main steps of the access delimitation procedure based on secret distribution. As a
result of the procedure, the consumer gets an opportunity to recover the key { ̅ ,  ̅ ,  ̅ } →  ̅ and
decrypt the desired resource corresponding to the privacy code  =  .</p>
        <p>As a result of the relevant procedures, each user forms his access matrix ‖ ̅‖, the size of which is
determined by the number of users in the information system and the number of different privacy codes.</p>
        <p>Administrator
 Participates in identification
and authentication
procedures
 Defines the unique number of</p>
        <p>each data owner
 Forms a Ds descriptor based</p>
        <p>on file registers
 Forms an access matrix
 Receives parts of the secret</p>
        <p>using a secure protocol
 Makes adjustments to the</p>
        <p>access matrix
 Receives reports on the
destruction of part of the
secret</p>
      </sec>
      <sec id="sec-3-2">
        <title>Role</title>
        <p>Owner
 Participates in
identification and
authentication procedures
 Creates a file registry and
provides it to the
administrator
 Defines the privacy code</p>
        <p>for the files being created
 Creates a token of the
owner of folders and data
files
 Matches requests and</p>
        <p>handle
 Generates keys in some</p>
        <p>different CC codes
 Encrypts and transfers files</p>
        <p>to IS
 Forms masks and secret</p>
        <p>parts
 Sends parts of the secret</p>
        <p>to other roles
 Receives reports on the
destruction of part of the
secret
 Safely stores keys and
secret parts</p>
        <p>Consumer
 Participates in
identification and
authentication
procedures
 Forms a request for
access to a specific
category of files of the
owner
 Receives parts of the
secret using a secure
protocol
 Gets access to the
content of the encrypted
resource thanks to the
provided parts of the
secret
 Destroys the decrypted
file, key, and parts of the
secret received from the
administrator and owner
of the resource
 Informs about the
execution of destruction</p>
        <p>A prerequisite for the security of the proposed decryption procedure is the destruction of the
corresponding decryption key  ̅ and decrypted files from the consumer immediately after the end of
the processing session. In this sense, the security of the procedure is facilitated by the use of hardware
and software cryptographic modules, which exclude the possibility of unauthorized access to the
downloaded parts of the secret and keys [22].</p>
        <p>
          Note that, according to the procedure, the security administrator never receives part of the user’s  ̅
secret, which according to (
          <xref ref-type="bibr" rid="ref5">5</xref>
          ), excludes his ability to decrypt the corresponding files and gain access to
their contents. Since only the content part of the files is subjected to this encryption, and its attributes
are not changed, it does not affect their overwriting or archiving procedures.
        </p>
        <p>The specified feature of the proposed mechanism of access delimitation also solves the problem of
information systems inspection for state control over the state of information protection since the
persons who carry out the inspection ( audit) of the system do not get access to the content of information
resources.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>5. Conclusions and Prospects for Further Research</title>
      <p>As part of the study of the project of building a network of situational centers as a block algorithm
for data encryption in the access demarcation system, the use of reliable cryptographic algorithms
defined by the national standard D STU 7624:2014 [23] and the international standard AES [24] in the
software implementation of cryptographic modules was tested key lengths of 256 bits. Both
implementations had sufficient speed. Further research is planned to be directed to develop methods for
reducing data processing delay time associated with the implementation of key and key mask generation
procedures, as well as data encryption.</p>
    </sec>
    <sec id="sec-5">
      <title>6. Acknowledgment</title>
    </sec>
    <sec id="sec-6">
      <title>5. References</title>
      <p>The authors thank Anatoliy Morozov, Academician of the National Academy of Sciences of Ukraine,
for helpful advice and research support.
[13] A. Y. Chadov, Development of requirements for a decentralized access control system. Issues of
information protection, no. 3, 13–16, 2018.
[14] A. Y. Chadov, Description of the formal model of the decentralized access control system, Complex
information protection: materials of the XXV scientific and practical conference, Sept. 15–17, 115–
121, 2020.
https://www.okbsapr.ru/library/publications/opisanie-formalnoy-modelidetsentralizovannoy-sistemy-razgranicheniya-dostupa1/
[15] A. A. Hrusho, E. E. Tymonina, Theoretical bases of information protection, Yachtsman, 1996.
[16] K. Shannon, The theory of communication in secret systems, Works on the theory of information
and cybernetics, ed. by R.L. Dobrushyna and O.B. Lupanova, 1963.
[17] B. Schneier . Applied cryptography: protocols, algorithms and source code in C, 2nd edition .</p>
      <p>Dialectic-Williams, 2017. ISBN: 978-5-9908462-4-1
[18] L. Harna, et al., Realizing secret sharing with general access structure, Information Sciences, vol.</p>
      <p>367–368, 209–220, 2016.
[19] H. Cramér. Mathematical Methods of Statistics, Princeton University Press, 1999. ISBN
9780691005478
[20] V. M.. Fomichev Methods of discrete mathematics in cryptology, Dialog-MYFI, 2010.
[21] H. Hulak, L. Kovalchuk, Different approaches to determining random sequences, Scientific and
technical collection “Legal, regulatory and metrological support of the information protection
system in Ukraine,” vol. 3, 2001, 127–133.
[22] I. D. Horbenko, Y. I. Horbenko, Applied cryptology: Theory. Practice. Application. Monograph.</p>
      <p>FORT, 2012.
[23] R. Oliynykov, et al., A New Encryption Standard of Ukraine: The Kalyna Block Cipher. IACR</p>
      <p>Cryptol, 2015.
[24] A. Biryukov, D. Khovratovich, Related-key Cryptanalysis of the Full AES-192 and AES-256.</p>
      <p>Advances in Cryptology, ASIACRYPT, vol. 5912, 2009.
https://doi.org/10.1007/978-3-64210366-7_1.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>H. M.</given-names>
            <surname>Hulak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. S.</given-names>
            <surname>Skeeter</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. G.</given-names>
            <surname>Hulak</surname>
          </string-name>
          ,
          <article-title>Methodological principles of creation and functioning of the cyber security center of the information infrastructure of nuclear energy facilities</article-title>
          .
          <article-title>Electronic professional scientific publication “Cybersecurity : education, science</article-title>
          , technology,” vol.
          <volume>4</volume>
          , no.
          <volume>12</volume>
          ,
          <fpage>172</fpage>
          -
          <lpage>186</lpage>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>I.</given-names>
            <surname>Bogachuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Buriachok</surname>
          </string-name>
          ,
          <article-title>Monitoring subsystem for wireless systems based on miniature spectrum analyzers</article-title>
          , in: 2018
          <source>International Scientific-Practical Conference Problems of Infocommunications. Science and Technology</source>
          ,
          <year>2018</year>
          . https://doi.org/10.1109/ infocommst.
          <year>2018</year>
          .
          <volume>8632151</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>V.</given-names>
            <surname>Buriachok</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Skladannyi</surname>
          </string-name>
          ,
          <article-title>Security rating metrics for distributed wireless systems</article-title>
          ,
          <source>in: Workshop of the 8th International Conference on "Mathematics. Information Technologies. Education": Modern Machine Learning Technologies and Data Science (MoMLeT and DS)</source>
          , vol.
          <volume>2386</volume>
          ,
          <fpage>222</fpage>
          -
          <lpage>233</lpage>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Kipchuk</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          , et al.
          <source>Investigation of Availability of Wireless Access Points based on Embedded Systems</source>
          .
          <source>2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&amp;T)</source>
          ,
          <year>2019</year>
          . https://doi.org/10.1109/ picst47496.
          <year>2019</year>
          .9061551
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>W.</given-names>
            <surname>Xiong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Lagerstrom</surname>
          </string-name>
          ,
          <article-title>Threat modeling-a systematic literature review</article-title>
          ,
          <source>Computers &amp; Security</source>
          , vol.
          <volume>84</volume>
          ,
          <fpage>53</fpage>
          -
          <lpage>69</lpage>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>W.</given-names>
            <surname>Xiong</surname>
          </string-name>
          , et al.,
          <article-title>Cyber security threat modeling based on the MITRE Enterprise ATT</article-title>
          &amp;CK Matrix,
          <source>Software and Systems Modeling</source>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>R.</given-names>
            <surname>Abdunabi</surname>
          </string-name>
          ,
          <article-title>An access control framework for mobile applications</article-title>
          , Dissertation, Colorado State University, https://mountainscholar.org/handle/10217/78814,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Khlaponin</surname>
          </string-name>
          , et al.,
          <article-title>Functions systems protection information and cyber security critical informative infrastructure, Electronic professional scientific edition Cyber security: education, science</article-title>
          , technology,
          <volume>3</volume>
          (
          <issue>15</issue>
          ),
          <fpage>124</fpage>
          -
          <lpage>134</lpage>
          ,
          <year>2022</year>
          . https://doi.org/10.28925/
          <fpage>2663</fpage>
          -
          <lpage>4023</lpage>
          .
          <year>2022</year>
          .
          <volume>15</volume>
          .1241341
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>D. A.</given-names>
            <surname>Kakhun</surname>
          </string-name>
          ,
          <article-title>Steps towards adaptive situation and context-aware access: A contribution to the extension of access control mechanisms within Pervasive Information Systems</article-title>
          , Doctoral thesis, Institut de Recherche en Informatique de Toulouse-UMR 5505 CNRS, http://www.theses.
          <source>fr/2012TOU30072</source>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10] ISO/IEC 27000, “Information technology
          <article-title>- security techniques - information security management systems - overview</article-title>
          and vocabulary” https://www.iso.org/obp/ui/#iso:std:iso-iec:27000:ed-5:v1:
          <fpage>en</fpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>NIST</surname>
          </string-name>
          ,
          <article-title>Framework for improving critical infrastructure cybersecurity</article-title>
          ,
          <source>ver. 1.1</source>
          ,
          <year>2018</year>
          . https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.
          <volume>04162018</volume>
          .pdf.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>American</given-names>
            <surname>National Standards Institute</surname>
          </string-name>
          , “
          <article-title>American National Standard for Information Technology-Role Based Access Control”</article-title>
          ,
          <source>ANSI INCITS 359</source>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>