{"title":"Protection of Scientific and Educational Resources \nin Information and Library Systems","authors":"M. Rakhmatullaev, S. Normatov","doi":"10.24108//2658-3143-2019-2-2-121-128","DOIUrl":null,"url":null,"abstract":"Introduction. The authors of the article highlight the results of research on the development of methods and \ntools for ensuring the information security of scientific and educational resources in information library systems and corporate information networks. The analysis of the state of the problem and the existing approaches \non this topic are given too. \nMaterials and Methods. The approach justifies the need to protect scientific resources from unauthorized access and the use of fuzzy logic to solve the problem. As a model and solution method, a fuzzy model correspondences is proposed, which makes it possible to comprehensively solve the problem of identifying threats in the \nevent of a situation, as well as provide recommendations on how to eliminate them. For the formation of a \nknowledge base, experts are involved who determine the functions of belonging to knowlege base “Situation — \nThreats — Actions to eliminate the threats”. \nResults. The research results are being implemented as part of the ARMAT++ information library system of the \ncorporate network of electronic libraries of 63 Uzbekistan universities for the protection of scientific and educational information from unauthorized access. Testing of the methods, programs of the subsystem and the expert knowledge base are carried out on the basis of information and resource centers under the project “Virtual \nelectronic library of the Tashkent University of Information Technologies named after Muhammad Al-Khorezmi \nand its five branches”. \nDiscussion and Conclusions. The use of the apparatus of fuzzy logic for the formation of a knowledge base of \nthe “Situation — Threats — Actions to eliminate the threats” type in information library systems significantly \nincreases the degree of protection of valuable information resources from unauthorized access.","PeriodicalId":434674,"journal":{"name":"Scholarly Research and Information","volume":"1592 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Scholarly Research and Information","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.24108//2658-3143-2019-2-2-121-128","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Introduction. The authors of the article highlight the results of research on the development of methods and
tools for ensuring the information security of scientific and educational resources in information library systems and corporate information networks. The analysis of the state of the problem and the existing approaches
on this topic are given too.
Materials and Methods. The approach justifies the need to protect scientific resources from unauthorized access and the use of fuzzy logic to solve the problem. As a model and solution method, a fuzzy model correspondences is proposed, which makes it possible to comprehensively solve the problem of identifying threats in the
event of a situation, as well as provide recommendations on how to eliminate them. For the formation of a
knowledge base, experts are involved who determine the functions of belonging to knowlege base “Situation —
Threats — Actions to eliminate the threats”.
Results. The research results are being implemented as part of the ARMAT++ information library system of the
corporate network of electronic libraries of 63 Uzbekistan universities for the protection of scientific and educational information from unauthorized access. Testing of the methods, programs of the subsystem and the expert knowledge base are carried out on the basis of information and resource centers under the project “Virtual
electronic library of the Tashkent University of Information Technologies named after Muhammad Al-Khorezmi
and its five branches”.
Discussion and Conclusions. The use of the apparatus of fuzzy logic for the formation of a knowledge base of
the “Situation — Threats — Actions to eliminate the threats” type in information library systems significantly
increases the degree of protection of valuable information resources from unauthorized access.