Secure Systems Design Technology

  • Peter D. Zegzhda
  • Dmitry P. Zegzhda
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2052)


Authors introduce a novel approach to the problem of secure system design, based on consistent and correct implementation of information flows and flow controls, fitted well with security policy, and on practical experience of security violation analysis. On this basis, concept of secure system design and development are proposed, forming a basis for secure information technologies development. Proposed technology and concepts can be applied from application tools and information systems design to operating system.


Access Control Information Processing System Security Policy Security Service Security Model 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Zegzhda, D.P., Ivashko, A.M.: On creation of secure information processing systems. “Information security problems. Computer systems”. 1 (1999) 99–105 (in Russian)Google Scholar
  2. 2.
    Zegzhda, D.P.: The analysis of Internet security accidents causes. “Vesnik Svyazi”. 4 (1999) 95–99 (in Russian)Google Scholar
  3. 3.
    Zegzhda D.P., Ivashko A.M.: Information systems security basics. “Goryachaya linia — Telekom”. Moscow (2000) 449 (in Russian)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2001

Authors and Affiliations

  • Peter D. Zegzhda
    • 1
  • Dmitry P. Zegzhda
    • 1
  1. 1.Information Security Centre of Saint-Petersburg Technical UniversitySaint Petersburg, K-273Italy

Personalised recommendations