Academic Journal
Development of protecting a software product mathematical model from unlicensed copying based on the GERT method
العنوان: | Development of protecting a software product mathematical model from unlicensed copying based on the GERT method |
---|---|
المؤلفون: | С.Г. Семенов, Чжан Ліцзян, Цао Вейлінь, В.В. Давидов |
المصدر: | Системи обробки інформації, Iss 1(164), Pp 73-82 (2021) |
بيانات النشر: | Ivan Kozhedub Kharkiv National Air Force University, 2021. |
سنة النشر: | 2021 |
المجموعة: | LCC:Information technology |
مصطلحات موضوعية: | software security, gert model, license security., Information technology, T58.5-58.64 |
الوصف: | The subject of the research is methods and algorithms for developing the GERT networks that provide a hidden transition along the branches of the control logic graph and the ability to encode digital watermarks in the context of existing threats to the licensing security of software systems. The aim of the work is to develop a system of a software product licensed security based on hidden transition algorithms in GERT networks that carry the properties of digital watermarks. The article solves the following goal: development of a model of a software licensed security system based on the developed algorithms using GERT networks. Methods of mathematical modeling, numerical experiment, complexity theory and cryptography are used. The following results were obtained: on the basis of the analysis of existing models for ensuring software licensed security, the main requirements for the algorithms synthesized within the framework of the developed model, as well as for the machine implementation of the algorithm, were identified. Based on the investigation of existing watermark systems, methods of attack on them, as well as the requirements put forward for the developed model, a licensing security algorithm was formed based on the watermark system. Conclusions: for the first time, algorithms for safe transition in GERT-networks were developed, which are used as a graph of the control logic of a software product. This logic is implemented depending on the identification or serial number; a model of a licensed security system has been developed, which has not only empirical, but also theoretical substantiation of resistance to attacks by an intruder. |
نوع الوثيقة: | article |
وصف الملف: | electronic resource |
اللغة: | English Russian Ukrainian |
تدمد: | 1681-7710 2518-1696 |
Relation: | https://journal-hnups.com.ua/index.php/soi/article/view/620; https://doaj.org/toc/1681-7710; https://doaj.org/toc/2518-1696 |
DOI: | 10.30748/soi.2021.164.08 |
URL الوصول: | https://doaj.org/article/37943a52458c47e7b0a462c865df0dd3 |
رقم الانضمام: | edsdoj.37943a52458c47e7b0a462c865df0dd3 |
قاعدة البيانات: | Directory of Open Access Journals |
تدمد: | 16817710 25181696 |
---|---|
DOI: | 10.30748/soi.2021.164.08 |