THE QUESTION OF METHODS AND ALGORITHMS FOR THE CONSTRUCTION OF A ROLL RESTRICTION SYSTEM OF USE

Authors

  • D.Y. Irgasheva

Keywords:

kompyuter tizimlari, xavfsizlik modellari, konfidensiallik, foydalanuvchanlik, foydalanishning cheklash tizimi

Abstract

This article is devoted to the analysis of the dynamic model of Use Management, the formal specification and algorithms in the dynamic model, and the description of the developed use roll restriction system model algorithm. The proposed model acts as a combined model, dynamically assigning competencies to roles, and assigning users to roles using different attributes. This approach applies only to the main objects of RBAC. In addition, the proposed model implements sod at the level of powers.

References

. Jackson D. Depandable Software by Design // 7 Scientific American, 2006; vol. 294, N 6. -P. 69-75.

Irgasheva D.Y. Povisheniye effektivnosti metodov razgranicheniya dostupa na osnove roley // Jurnal «Muxammad al-Xorazmiy avlodlari». -Tashkent, 2020. -№4 (14) - S.144-149.

. Irgasheva D.Y., Agzamova M.Sh., Gaipnazarov R., Rustamova S. E-payment Systems Security solutions using Facial Authentication based on Artificial Neural networks. 12th World Conference on Intelligent Systems for Industrial Automation. WCIS-2022. 25-26 November, Tashkent-Uzbekistan. Scopus.

. Tashev K.A. Agzamova M.Sh., Irgasheva D.Y. Comparative performance analysis the Aho- Corasick algorithm for developing a network detection system. International Conference on Information Science and Communications Technologies. ICISCT 2022. Scopus.

.Irgasheva D.Y., Agzamova M.Sh. Analysis state of the art of anomaly-based detection systems using machine learning algorithms. International Conference on Information Science and Communications Technologies. ICISCT 2022. Scopus.

Irgasheva, D ./ On the Basic Method for Solving the Problem of Synthesizing Access Control Systems// 2020 International Conference on Information Science and Communications Technologies, ICISCT 2020. DOI: 10.1109/ICISCT 50599.2020.9351444. EID: 2-s2.0-85102113415

Durdona Yakubdjanovna, I. Nurbek Bakhtiyarovich, N. Lqbol Ubaydullayevna, X. /Implementation of intercorporate correlation of information security messages and audits// 2020 International Conference on Information Science and Communications Technologies, ICISCT 2020. DOI: 10.1109/ICISCT 50599.2020.9351470. EID: 2-s2.0-85102099097

Durdona , I. , Shahboz , I., Lola, D. , Sanobar , R. /Face sketch recognition threat model// 2020 International Conference on Information Science and Communications Technologies, ICISCT 2020. DOI: 10.1109/ICISCT 50599.2020.9351369. EID: 2-s2.0-85102145465

Irgasheva, D./ Indicators of Efficiency of Synthesis of Access Control Systems// 2021 International Conference on Information Science and Communications Technologies, ICISCT 2021. DOI: 10.1109/ICISCT 52966.2021.9670082. EID: 2-s2.0-85125046854.

Irgasheva, D., Davronova, L./ Superpixel Based Face Sketch Recognition Scheme// International Conference on Information Science and Communications Technologies: Applications, Trends and Opportunities, ICISCT 2021. DOI: 10.1109/ICISCT 52966.2021.9670266 . EID: 2-s2.0-85125051626 .

Irgasheva, D., Khurramov, D., Rustamova, S ./ Approaches to Formalizing the Access Control System// International Conference on Information Science and Communications Technologies: Applications, Trends and Opportunities, ICISCT 2021. DOI: 10.1109/ICISCT 52966.2021.9670040 . EID: 2-s2.0-85125051656 .

Иргашева Д.Я., Джаматов М.Х., Джаматова Д.М. УГРОЗЫ РАЗГРАНИЧЕНИЯ ДОСТУПА В КОМПЬЮТЕРНЫХ СИСТЕМАХ. «Ахбороткоммуникациялар: Тармоқлар, Технологиялар, Ечимлар». №3(71), 2024 й. 53-59 Стр.

Irgasheva, D. Y., INFOKOMMUNIKASIYA TIZIMLARDA FOYDALANISHNI ROLLI CHEKLASH TIZIMINI QURISH MODELLARI VA USULLARI, Raqamli Transformatsiya va Sun’iy Intellekt ilmiy jurnali: VOLUME 2, ISSUE 6, DECEMBER 2024. 214-227 BB. https://dtai.tsue.uz/index.php/dtai/article/view/v2i631.

Published

2025-06-03

How to Cite

Irgasheva, D. (2025). THE QUESTION OF METHODS AND ALGORITHMS FOR THE CONSTRUCTION OF A ROLL RESTRICTION SYSTEM OF USE. The Descendants of Al-Fargani, (2), 71–79. Retrieved from http://al-fargoniy.uz/index.php/journal/article/view/829