To obtain access to full text of journal and articles you must register!
- Article name
- Algorithm for testing security functions of software and hardware data security tools based on the use of the graph theory
- Authors
- Kanner T. M., , tatianash@okbsapr.ru, JSC "OKB SAPR"; Moscow Institute of Physics and Technology (National Research University), Moscow, Russia; Dolgoprudny, Moscow region, Russia
- Keywords
- software and hardware DST testing / completeness and optimality of testing / directed loop-free graph without multiple edges / algorithm for testing security functions of software and hardware DST / Chinese postman problem / Eulerian path
- Year
- 2021 Issue 3 Pages 12 - 15
- Code EDN
- Code DOI
- 10.52190/2073-2600_2021_3_12
- Abstract
- The article discusses existing approaches to testing software and hardware data security tools (DST), which allow to ensure the completeness of testing, but do not solve the issue of its optimality. The definition of the problem of testing software and hardware DST is given and an approach to checking its feasibility using graph theory is proposed. The algorithm based on this approach is considered for testing security functions of software and hardware DST, which makes it possible to ensure its completeness and optimality.
- Text
- BUY for read the full text of article
- Buy
- 500.00 rub