{"id":"https://openalex.org/W3094701468","doi":"https://doi.org/10.3390/sym12111840","title":"A Model of Threats to the Confidentiality of Information Processed in Cyberspace Based on the Information Flows Model","display_name":"A Model of Threats to the Confidentiality of Information Processed in Cyberspace Based on the Information Flows Model","publication_year":2020,"publication_date":"2020-11-06","ids":{"openalex":"https://openalex.org/W3094701468","doi":"https://doi.org/10.3390/sym12111840","mag":"3094701468"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym12111840","pdf_url":"https://www.mdpi.com/2073-8994/12/11/1840/pdf?version=1604660635","source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2073-8994/12/11/1840/pdf?version=1604660635","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087986036","display_name":"Nikolay Sergeevich Egoshin","orcid":"https://orcid.org/0000-0003-4770-0701"},"institutions":[{"id":"https://openalex.org/I114376631","display_name":"Tomsk State University of Control Systems and Radio-Electronics","ror":"https://ror.org/032j5hw78","country_code":"RU","type":"education","lineage":["https://openalex.org/I114376631"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Egoshin N. S.","raw_affiliation_strings":["Department of Complex Information Security of Computer Systems, Tomsk State University of Control Systems and Radioelectronics, 40 Lenina Prospect, 634050 Tomsk, Russia"],"affiliations":[{"raw_affiliation_string":"Department of Complex Information Security of Computer Systems, Tomsk State University of Control Systems and Radioelectronics, 40 Lenina Prospect, 634050 Tomsk, Russia","institution_ids":["https://openalex.org/I114376631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001477931","display_name":"\u0410\u043d\u0442\u043e\u043d \u041a\u043e\u043d\u0435\u0432","orcid":"https://orcid.org/0000-0002-3222-9956"},"institutions":[{"id":"https://openalex.org/I114376631","display_name":"Tomsk State University of Control Systems and Radio-Electronics","ror":"https://ror.org/032j5hw78","country_code":"RU","type":"education","lineage":["https://openalex.org/I114376631"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Konev A. A.","raw_affiliation_strings":["Department of Complex Information Security of Computer Systems, Tomsk State University of Control Systems and Radioelectronics, 40 Lenina Prospect, 634050 Tomsk, Russia"],"affiliations":[{"raw_affiliation_string":"Department of Complex Information Security of Computer Systems, Tomsk State University of Control Systems and Radioelectronics, 40 Lenina Prospect, 634050 Tomsk, Russia","institution_ids":["https://openalex.org/I114376631"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029791948","display_name":"Alexander Shelupanov","orcid":"https://orcid.org/0000-0003-2393-6701"},"institutions":[{"id":"https://openalex.org/I114376631","display_name":"Tomsk State University of Control Systems and Radio-Electronics","ror":"https://ror.org/032j5hw78","country_code":"RU","type":"education","lineage":["https://openalex.org/I114376631"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"Shelupanov A. A.","raw_affiliation_strings":["Department of Complex Information Security of Computer Systems, Tomsk State University of Control Systems and Radioelectronics, 40 Lenina Prospect, 634050 Tomsk, Russia"],"affiliations":[{"raw_affiliation_string":"Department of Complex Information Security of Computer Systems, Tomsk State University of Control Systems and Radioelectronics, 40 Lenina Prospect, 634050 Tomsk, Russia","institution_ids":["https://openalex.org/I114376631"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5029791948"],"corresponding_institution_ids":["https://openalex.org/I114376631"],"apc_list":{"value":2000,"currency":"CHF","value_usd":2165,"provenance":"doaj"},"apc_paid":{"value":2000,"currency":"CHF","value_usd":2165,"provenance":"doaj"},"fwci":2.663,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.853588,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":86,"max":87},"biblio":{"volume":"12","issue":"11","first_page":"1840","last_page":"1840"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9969,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9969,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9967,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9949,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/information-flow","display_name":"Information flow","score":0.68389326},{"id":"https://openalex.org/keywords/cartesian-product","display_name":"Cartesian product","score":0.4572089},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.43844706}],"concepts":[{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.8177387},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.7994498},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.79222524},{"id":"https://openalex.org/C2779136372","wikidata":"https://www.wikidata.org/wiki/Q10283002","display_name":"Information flow","level":2,"score":0.68389326},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.64912975},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.58248085},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.50598496},{"id":"https://openalex.org/C65236422","wikidata":"https://www.wikidata.org/wiki/Q173740","display_name":"Cartesian product","level":2,"score":0.4572089},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.43844706},{"id":"https://openalex.org/C180198813","wikidata":"https://www.wikidata.org/wiki/Q121182","display_name":"Information system","level":2,"score":0.43736842},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.17299753},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.11112133},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0813503},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.071418464},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym12111840","pdf_url":"https://www.mdpi.com/2073-8994/12/11/1840/pdf?version=1604660635","source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":false,"landing_page_url":"https://doaj.org/article/8f1d966f6b8b4dd3a78d054bae560bb8","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym12111840","pdf_url":"https://www.mdpi.com/2073-8994/12/11/1840/pdf?version=1604660635","source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","score":0.45,"id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":31,"referenced_works":["https://openalex.org/W100609208","https://openalex.org/W157860609","https://openalex.org/W1596726615","https://openalex.org/W1645702944","https://openalex.org/W1725082835","https://openalex.org/W1886616740","https://openalex.org/W1972809722","https://openalex.org/W1989609831","https://openalex.org/W1993619428","https://openalex.org/W2017112621","https://openalex.org/W2025154874","https://openalex.org/W2031551949","https://openalex.org/W2039632346","https://openalex.org/W2048099096","https://openalex.org/W2062773855","https://openalex.org/W2108405629","https://openalex.org/W2116560806","https://openalex.org/W2333483407","https://openalex.org/W2407156157","https://openalex.org/W2460729139","https://openalex.org/W25390154","https://openalex.org/W2542517830","https://openalex.org/W2618405946","https://openalex.org/W2741724259","https://openalex.org/W2791728452","https://openalex.org/W2909630727","https://openalex.org/W2913877484","https://openalex.org/W2919469235","https://openalex.org/W2978402186","https://openalex.org/W2995143261","https://openalex.org/W3016987019"],"related_works":["https://openalex.org/W4251169878","https://openalex.org/W3167675181","https://openalex.org/W2810589793","https://openalex.org/W2377660959","https://openalex.org/W2372005904","https://openalex.org/W2368745349","https://openalex.org/W2365469275","https://openalex.org/W2360897455","https://openalex.org/W2131575257","https://openalex.org/W144012884"],"abstract_inverted_index":{"This":[0],"article":[1,15],"covers":[2],"one":[3],"of":[4,8,41,47,54,61,75,80,91,101,110,113,127,130,135,141,147],"the":[5,29,39,42,48,52,62,71,99,111,114,124,145],"fundamental":[6],"problems":[7],"information":[9,25,30,77,92,103,116,148],"security\u2014building":[10],"a":[11,17,128,133,138],"threat":[12,34,57],"model.":[13,32,58],"The":[14,33,89],"discusses":[16],"new":[18],"method":[19],"for":[20],"identifying":[21],"typical":[22,120,142],"threats":[23,121,131,143],"to":[24,51,69,105,122,144],"confidentiality":[26,146],"based":[27,37],"on":[28,38],"flow":[31,117],"model":[35,90,140],"is":[36,137],"description":[40,46,100],"system.":[43],"An":[44],"incorrect":[45,56],"system":[49,72,104],"leads":[50],"formation":[53],"an":[55,106],"A":[59],"review":[60],"subject":[63],"area":[64],"revealed":[65],"several":[66],"approaches":[67,82],"used":[68],"describe":[70],"in":[73,95,150],"terms":[74],"circulating":[76],"flows.":[78],"Each":[79],"these":[81],"has":[83],"its":[84],"own":[85],"pros":[86],"and":[87,132],"cons.":[88],"flows":[93],"proposed":[94],"this":[96],"work":[97],"reduces":[98],"any":[102],"eight-digit":[107],"alphabet.":[108],"Analysis":[109],"structure":[112],"elementary":[115],"identified":[118],"four":[119],"confidentiality,":[123],"Cartesian":[125],"product":[126],"set":[129,134],"streams":[136],"complete":[139],"processed":[149],"cyberspace.":[151]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3094701468","counts_by_year":[{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":1}],"updated_date":"2024-12-08T16:37:28.996366","created_date":"2020-11-09"}