
http://www.iaeme.com/IJMET/index.asp 1645 editor@iaeme.com
International Journal of Mechanical Engineering and Technology (IJMET)
Volume 10, Issue 03, March 2019, pp. 1645–1654, Article ID: IJMET_10_03_166
Available online at http://www.iaeme.com/ijmet/issues.asp?JType=IJMET&VType=10&IType=3
ISSN Print: 0976-6340 and ISSN Online: 0976-6359
© IAEME Publication Scopus Indexed
METHOD FOR DETERMINATION OF THE
PROBABILITIES OF FUNCTIONING STATES
OF INFORMATION OF PROTECTION ON
CLOUD COMPUTING
Gulomov Sherzod Rajaboevich
Department of Providing Information Security, Tashkent University of Information
Technologies named after Muhammad al-Khwarizmi, Tashkent, Uzbekistan
Abdullaev Dilmurod Gulamovich
Department of Providing Information Security, Tashkent University of Information
Technologies named after Muhammad al-Khwarizmi, Tashkent, Uzbekistan
Nasrullaev Nurbek Bakhtiyorovich
Department of Providing Information Security, Tashkent University of Information
Technologies named after Muhammad al-Khwarizmi, Tashkent, Uzbekistan
Zokirov Odiljon Yoqubjon ugli
Department of Providing Information Security, Tashkent University of Information
Technologies named after Muhammad al-Khwarizmi, Tashkent, Uzbekistan
ABSTRACT
In this article the work of the components of information of protection tools on the
occurring violations, their types and the elimination of these violations and the possible
trajectory of a change over time of the functioning states of information of protection
tools with a discrete time are researched. Schemes for the transition of states of
information protection tools and a graph of probabilities of transitions between the
functioning states of information of protection tools with discrete time, allows for
detecting the vulnerabilities of information of protection tools are developed. Taking
into account the above, a method for determining the probabilities of states for the
functioning information of protection tools with discrete time allows describing a
graph-scheme of transitions using a small dimensionality of sets of states, to make a
square transition matrix at a lower bit depth is offered.
Key words: Discrete-time, possible trajectory, vulnerability, discrete mode, transition
probabilities, content filtering systems