post_parent): $temp_content = $post->post_content; $temp_content = explode("

",$temp_content); $temp_content = $temp_content[1]; $temp_content = explode("

",$temp_content); $temp_content = $temp_content[0]; $temp_content = strip_tags($temp_content); $temp_content = trim($temp_content); $authors = explode(",",$temp_content); ?> post_title));?>"> $value): ?> "> "> "> post_content); while ($parser->parse()) { if (($parser->iNodeName=="a")&&(substr_count($parser->iNodeAttributes['href'],".pdf")>0)): ?>

Dorohiy I.

Critical IT infrastructure can be modeled as cyber-physical systems, in which software components control the basic physical processes in order to optimize system requirements based on physical properties and limitations, as well as current and projected future state of the system. Such systems typically require guaranteed performance and safety, wrongly received or missed instructions can destabilize the entire IT infrastructure or some of its parts or even stop it working completely. However, the security and stability of the critical IT infrastructure of heterogeneous components is still open and difficult problem.
This paper proposes a robust architecture for stable operation of critical IT infrastructure. The problems of model of threats, vulnerabilities, availability of real-time integrity while performing are described and there are showing ways to obtain stability from intentional interference in system work and unforeseen lacks in the design, using components enabled trusted computing and access management structure.

Download (pdf)