Generation of metadata for information technology control
Alexander Grusho, Nick Grusho, Elena Timonina, Michael Zabezhailo
15m
To ensure the information security of network interactions it has been proposed to manage network connections using metadata. The metadata contains information about admissible task interactions and application locations to solve them in a corporative network.
In the paper models of hierarchical decomposition of information technology in the form of directed acyclic graph have built. Hierarchical decomposition makes it possible to optimally form blocks of information transformations for their distribution on hosts of distributed information and computing system. Those graphs are used for metadata construction.