To see the other types of publications on this topic, follow the link: Astra Linux.

Journal articles on the topic 'Astra Linux'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 28 journal articles for your research on the topic 'Astra Linux.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Labinsky, Alexander. "FEATURES OF ASTRA LINUX OPERATING SYSTEM." MONITORING AND EXPERTISE IN SAFETY SYSTEM 2024, no. 1 (2024): 43–48. http://dx.doi.org/10.61260/2304-0130-2024-1-43-48.

Full text
Abstract:
The features of the Astra Linux operating system developed by based on the kernel of the Linux operating system as part of the implementation of the state program on the creation and use of free software with a license for free copying and installation for an unlimited number of users, including the structure of the architecture of the Linux operating system, characteristics of its kernel, features of file and graphic systems, as well as office software packages Star Office and K Office. Distributions of the Astra Linux operating system are described, which are used as part of the implementati
APA, Harvard, Vancouver, ISO, and other styles
2

Ognev, Igor A., Ivan V. Nikroshkin, Mikhail A. Medvedev, and Artyom D. Krasnikov. "Study of built-in information protection tools of Unix systems on the example of malware infection." Proceedings of Tomsk State University of Control Systems and Radioelectronics 26, no. 4 (2023): 29–34. http://dx.doi.org/10.21293/1818-0442-2023-26-4-29-34.

Full text
Abstract:
This article provides a comparative analysis of the built-in information protection tools of the Unix family operating systems using the example of malware infection of the operating system. The study involved open-source operating systems – Debian, and domestic operating systems – Alt Linux, RedOS, Astra Linux Special Edition. A ransomware virus was used as a malicious software. The presented results demonstrate the greatest ability of the Astra Linux operating system to resist malware infection.
APA, Harvard, Vancouver, ISO, and other styles
3

Чураков, Д. Ю., И. С. Горященко, Т. С. Хван, and И. А. Истомина. "The use of the Astra Linux operating system in the activities of employees of the penal system of the Russian Federation: opportunities and problems." Vedomosti (Knowledge) of the Penal System, no. 3(250) (March 31, 2023): 73–80. http://dx.doi.org/10.51522/2307-0382-2023-250-3-73-80.

Full text
Abstract:
Актуальность применения программных средств, входящих в единый реестр российских программ для электронных вычислительных машин и баз данных, в том числе и отечественного офисного программного обеспечения, продиктована необходимостью использования разработок, не содержащих зарубежных систем и патентов. Предметом исследования является отечественное офисное программное обеспечение, используемое в деятельности работников уголовно-исполнительной системы Российской Федерации. Цель исследования – рассмотрение возможности использования такого программного обеспечения и выявление проблем, возникающих п
APA, Harvard, Vancouver, ISO, and other styles
4

Devyanin, Petr Nikolaevich. "The Results of Reworking the Levels of Role-Based Access Control and Mandatory Integrity Control of the Formal Model of Access Control in Astra Linux." Proceedings of the Institute for System Programming of the RAS 35, no. 5 (2023): 7–22. http://dx.doi.org/10.15514/ispras-2022-35(5)-1.

Full text
Abstract:
The access control mechanism is the basis for ensuring the security of system software (OS or DBMS). In accordance with the requirements of regulatory documents of domestic regulators for certified information security tools, as a scientific basis for the implementation of such a mechanism, a formal access control model that meets the GOST R 59453.1-2021 criteria should be developed. Such a formal model for the Astra Linux operating system certified for the highest protection classes and assurance levels is the mandatory entity-role model of access and information flows security control in OS
APA, Harvard, Vancouver, ISO, and other styles
5

Lazarev, Sergey Alexandrovich, and Konstantin Anatolievich Rubtsov. "About behavioral analytics for a system of protection against targeted attacks and its application for operating systems of the Astra Linux family." Research Result. Information technologies 9, no. 4 (2024): 11–20. https://doi.org/10.18413/2518-1092-2024-9-4-0-2.

Full text
Abstract:
The article discusses the task of developing a behavioral analytics subsystem for a system of protection against targeted attacks and the application of its work on operating systems of the Astra Linux family. A review of possible types of targeted attacks and typical actions to be assessed when building a protection system against targeted attacks is provided. Various types of security systems and their ranking according to protection technologies are considered. It is proposed to use a multidimensional Gaussian distribution model (GMM) to analyze the behavior of objects of information intera
APA, Harvard, Vancouver, ISO, and other styles
6

Bochkareva, O. V., V. V. Skuratov, O. V. Snezhkina, and Yu M. Tsarapkina. "Implementation of the Educational Process of the University in the Conditions of Transition to Domestic Software." Open Education 25, no. 1 (2021): 4–15. http://dx.doi.org/10.21686/1818-4243-2021-1-4-15.

Full text
Abstract:
Цель исследования. Рассматривается проблема обучения информатике курсантов военных высших учебных заведений в условиях перехода на использование отечественного программного обеспечения – операционную систему Astra Linux, комплектуемую офисным пакетом LibreOffice. Решение данной проблемы предполагает внесение изменений в содержание учебного курса. Поэтому целями исследования являлись: выработка рекомендаций по адаптации рабочих программ и тематических планов дисциплины «Информатика» под программное обеспечение Astra Linux, разработка учебно-методических материалов для проведения занятий по осво
APA, Harvard, Vancouver, ISO, and other styles
7

Lobach, A. O. "Integration of Information Security System with the Astra Linux Directory service: problems and approaches." Information Security Questions, no. 3 (2021): 3–7. http://dx.doi.org/10.52190/2073-2600_2021_3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Баранов, А. В., A. V. Baranov,, П. М. Корепанов, P. M. Korepanov,, И. А. Лепешев, and I. A. Lepeshev,. "USB connections control in the local network of computers running under Astra Linux SE." Международный журнал "Программные продукты и системы" 15 (August 28, 2023): 432–41. http://dx.doi.org/10.15827/0236-235x.143.432-441.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Строгонов, А. В., О. Бордюжа та А. И. Строгонов. "МЕЖДУНАРОДНЫЙ ОПЫТ РАЗРАБОТКИ ПРОЦЕССОРНЫХ ЯДЕР RISC-V И ПРОГРАММНЫЕ ИНСТРУМЕНТЫ С ОТКРЫТЫМ КОДОМ ДЛЯ ИХ ПРОЕКТИРОВАНИЯ". ELECTRONICS: SCIENCE, TECHNOLOGY, BUSINESS 238, № 7 (2024): 156–64. https://doi.org/10.22184/1992-4178.2024.238.7.156.164.

Full text
Abstract:
В России и Китае большой интерес проявляют к процессорной архитектуре RISC-V. В сентябре 2022 года в России была создана ассоциация независимых разработчиков ПО и вычислительной техники на основе RISC-V, которая получила название «Альянс RISC-V». В него вошли производитель серверов и систем хранения данных Yadro («КНС групп»), разработчик процессоров «Байкал Электроникс», разработчик ОС Astra Linux группа «Астра», разработчик технологической программно- аппаратной платформы Vostok и НИУ «Московский институт электронной техники». В статье рассмотрен опыт разработки процессорных ядер RISC-V комм
APA, Harvard, Vancouver, ISO, and other styles
10

Dokshin, A. D., M. M. Kovtsur, S. V. Prudnikov, and A. I. Targonskaya. "RESEARCH OF APPROACHES FOR AUTHENTICATION OF WIRELESS NETWORK USERS USING VARIOUS LDAP SOLUTIONS." H&ES Research 13, no. 3 (2021): 28–35. http://dx.doi.org/10.36724/2409-5419-2021-13-3-28-35.

Full text
Abstract:
Intoduction: every year, the technology of the IEEE802.11 family of networks is becoming more widespread and popular. Based on the possible risks, IT administrators take measures to protect their organizations. One of the ways to improve information security is to use IEEE802.1 x for user authorization. Purpose: the purpose of the study is to study various LDAP solutions for user authorization in a wireless network. Results: three variants of the centralized solution for authorization of users of a wireless network on the basis of operating systems are developed: Windows Server, Ubuntu Linux,
APA, Harvard, Vancouver, ISO, and other styles
11

Devyanin, P. N., and M. A. Leonova. "The techniques of formalization of OS Astra Linux Special Edition access control model using Event-B formal method for verification using Rodin and ProB." Prikladnaya Diskretnaya Matematika, no. 52 (2021): 83–96. http://dx.doi.org/10.17223/20710410/52/5.

Full text
Abstract:
The paper presents techniques to specification access control model of OS Astra Linux Special Edition (the MROSL DP-model) in the formalized notation (formalized using the Event-B formal method), that are based on the use of several global types, separation of general total functions into specific total functions, reduction in the number of invariants and guard of events, which iterate over subsets of a certain set. The result of using these techniques was the simplification of automated deductive verification of formalized notation using the Rodin tool and adaptation of the model to verificat
APA, Harvard, Vancouver, ISO, and other styles
12

Smirnov, Yu V. "Comparative analysis of foreign and Russian software for libraries." Scientific and Technical Libraries, no. 12 (December 27, 2023): 97–115. http://dx.doi.org/10.33186/1027-3689-2023-12-97-115.

Full text
Abstract:
The author accomplishes comparative analysis of Russian and foreign software for the library sector. The need for such analysis is determined by the strategy of import substitution stimulated by the Western sanctions. Software and databases recommended for purchase and application on the territory of the Russian Federation are included into the Russian Software Register and Eurasian Software Register. Every library uses its own software package, however, the essential software includes operating system, web browser, office suite, automated library information system (ALIS). The author compares
APA, Harvard, Vancouver, ISO, and other styles
13

Tygier, S., D. Akello-Egwel, J. Allen, et al. "Tomographic reconstruction with Mantid Imaging." Journal of Physics: Conference Series 2605, no. 1 (2023): 012017. http://dx.doi.org/10.1088/1742-6596/2605/1/012017.

Full text
Abstract:
Abstract Mantid Imaging has been developed to provide a graphical reconstruction process for users of neutron imaging instruments to eliminate the need to fall back on commercial software. Mantid Imaging builds on algorithms provided by libraries including Astra Toolbox and Tomopy to offer noise reduction, artifact removal, alignment, filtered back projection and iterative reconstruction methods. Extra functionality was added by using algorithms from ALGOTOM for ring removal and from the Core Imaging Library (CIL) for regularised 3D reconstruction. Mantid Imaging 2.4 has recently been released
APA, Harvard, Vancouver, ISO, and other styles
14

Egorova, Victoriia Vyacheslavovna, Alexey Sergeevich Panov, Vladimir Yurevich Telezhnikov, and Petr Nikolaevich Devyanin. "Approaches for improving the efficiency of protected OS components fuzzing." Proceedings of the Institute for System Programming of the RAS 34, no. 4 (2022): 21–34. http://dx.doi.org/10.15514/ispras-2022-34(4)-2.

Full text
Abstract:
Fuzzing as a part of the continuous integration is a necessary tool, aimed primarily at the providing confidence in the software being developed. At the same time, in the presence of significant amounts of the source code, fuzzing becomes a resource-intensive task. That’s why increasing the efficiency of fuzzing to reach needed code sections more quickly without reducing quality becomes an important line of research. The article deals with approaches to improve the efficiency of fuzzing both for kernel and for user-space software. On the other hand, on these amounts of program code, static cod
APA, Harvard, Vancouver, ISO, and other styles
15

Shumilin, A. V. "The main elements of the mandatory entity-role DP model of access and information flows control for PostgreSQL DBMS used in the special-purpose operating system Astra Linux Special Edition." Prikladnaya diskretnaya matematika, no. 21 (September 1, 2013): 62–67. http://dx.doi.org/10.17223/20710410/21/6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Devyanin, Petr Nikolaevich, Vladimir Iurevich Telezhnikov, and Alexey Vladimirovich Khoroshilov. "Building a methodology for secure system software development on the example of operating systems." Proceedings of the Institute for System Programming of the RAS 33, no. 5 (2021): 25–40. http://dx.doi.org/10.15514/ispras-2021-33(5)-2.

Full text
Abstract:
System software is a cornerstone of any software system, so building secure system software in accordance with requirements of certification authorities and state-of-the-art practices is an important scientific and technical problem. One of possible approaches to cope with the problem is to build a methodology for secure system software development including advanced scientific technologies and industry best practices. The paper presents current results achieved in building such methodology in the following directions. The first one is regulatory framework improvement including development of
APA, Harvard, Vancouver, ISO, and other styles
17

E.I., Manakova, and Shvetsov N.I. "DOMESTIC OPERATING SYSTEMS AS AN ALTERNATIVE TO WINDOWS." ИННОВАЦИОННЫЕ НАУЧНЫЕ ИССЛЕДОВАНИЯ 2022. 12-3(24) (December 29, 2022): 79–86. https://doi.org/10.5281/zenodo.7491645.

Full text
Abstract:
The article discusses popular domestic operating systems, as an alternative to Windows. The issues related to the import substitution of software are highlighted. A brief description of the measures contributing to the import substitution of software is given. Since March 2022, many suppliers of foreign software have been forced to refuse to work with Russian customers. Among them is Microsoft, which is a major software supplier. This fact significantly accelerated the process of import substitution.
APA, Harvard, Vancouver, ISO, and other styles
18

Devyanin, Petr Nikolaevich. "On the Development of the Draft Standard GOST R “Information Protection. Formal Access Control Model. Part 3. Recommendations on Development”." Proceedings of the Institute for System Programming of the RAS 36, no. 3 (2024): 63–82. http://dx.doi.org/10.15514/ispras-2024-36(3)-5.

Full text
Abstract:
Formal models of access control must be described in accordance with the requirements of FSTEC of Russia regulatory documents, in order to ensure trust in certified information security tools when they implement appropriate access control policies. The criterias that the description of each such model must meet were established in GOST R 59453.1-2021 “Information protection. Formal access control model. Part 1. General principles” to stimulate the development of formal access control models that are adequate to the operating conditions of modern information security tools. This standard also s
APA, Harvard, Vancouver, ISO, and other styles
19

Kuzmin, Anatoly, Alexey Permyakov, and Nikolay Romanov. "MODELING OF THE STATE OF VAPOR-LIQUID EQUILIBRIUM OF HYDROCARBON MIXTURES BASED ON THE TWO-CONSTANT PENG-ROBINSON EQUATION." Scientific and analytical journal «Vestnik Saint-Petersburg university of State fire service of EMERCOM of Russia» 2024, no. 4 (2024): 1–11. https://doi.org/10.61260/2218-130x-2025-2024-4-1-11.

Full text
Abstract:
Problems arising when using Soave-Redlich-Kwong equation and initial Redlich-Kwong equation in the process of numerical modeling are analyzed. The possibility of using a simpler two-consonant Peng-Robinson equation in the modeling process was evaluated, which at the same time will allow to obtain better results than using the Soave-Redlich-Kwong equation. An algorithm for calculating the parameters of the state of the hydrocarbon mixture has been formed. The software implementation of the algorithm is made in the form of a Basic macro, using the LibreOffice Calc tabular processor interface, co
APA, Harvard, Vancouver, ISO, and other styles
20

Marco-Gisbert, Hector, and Ismael Ripoll Ripoll. "Address Space Layout Randomization Next Generation." Applied Sciences 9, no. 14 (2019): 2928. http://dx.doi.org/10.3390/app9142928.

Full text
Abstract:
Systems that are built using low-power computationally-weak devices, which force developers to favor performance over security; which jointly with its high connectivity, continuous and autonomous operation makes those devices specially appealing to attackers. ASLR (Address Space Layout Randomization) is one of the most effective mitigation techniques against remote code execution attacks, but when it is implemented in a practical system its effectiveness is jeopardized by multiple constraints: the size of the virtual memory space, the potential fragmentation problems, compatibility limitations
APA, Harvard, Vancouver, ISO, and other styles
21

Eglitis, Ilgmars, and Vitaly Andruk. "Astrometry and photometry of digitized plates of Baldone Schmidt telescope." Open Astronomy 30, no. 1 (2021): 12–23. http://dx.doi.org/10.1515/astro-2021-0002.

Full text
Abstract:
Abstract During the 40-year photographic period of astronomical observations, the Baldone Astrophysical Observatory has accumulated more than 22,000 direct and 2,500 spectral images. In 2018, the digitization of direct astrophoto images with a resolution of 1200 dpi was completed. A processing methodology for obtaining the equatorial coordinates and photometric characteristics of the objects recorded in digitized astronegatives using the LINUX/MIDAS/ROMAFOT environment has been developed at the Main Astronomical Observatory of the National Academy of Sciences of Ukraine. Program package with s
APA, Harvard, Vancouver, ISO, and other styles
22

Antaki-Masson, Patricia. "Considérations sur le luminaire médiéval religieux au Proche-Orient." Chronos 32 (September 29, 2018): 87–102. http://dx.doi.org/10.31377/chr.v32i0.113.

Full text
Abstract:
Que ce soit dans les lieux de culte chrétiens, musulmans ou juifs, la lumière, naturelle ou artificielle, n’a pas pour seul objectif d’éclairer le monument mais représente aussi, et surtout, la présence divine (Bonnéric 2012a). Ce rôle est d’ailleurs mis en valeur dans les textes sacrés. Ainsi, par exemple, Jésus annonce : « Je suis la Lumière du monde, qui me suit ne marchera pas dans les ténèbres, mais aura la lumière de la vie » (Jean 8 : 12). Dans le Coran apparaît ce célèbre verset : « Dieu est la Lumière des cieux et de la terre. Sa lumière est semblable à une niche où se trouve une lamp
APA, Harvard, Vancouver, ISO, and other styles
23

Himmelsbach, Monika. "How we roll online." merz | medien + erziehung 64, no. 1 (2020): 78–79. http://dx.doi.org/10.21240/merz/2020.1.21.

Full text
Abstract:
Die Zeit ist vorbei, in der Rollenspielerinnen und -spieler abgeschottet im Keller sitzen und angeblichem Teufelswerk nachgehen. Zumindest in bestimmten Kreisen haben Spiele wie Dungeons & Dragons, Das Schwarze Auge und Midgard das Internet erobert. Spielsessions werden auf YouTube und Twitch1 gestreamt, Foren beschäftigen sich mit den Entwicklungen der Szene und Websites helfen Spielleitenden, ihre Welt zu erschaffen. Schon lange bilden Stift und Papier nicht mehr die einzige Grundlage für ein Rollenspiel. Seinen Anfang hatte das Rollenspiel im Jahre 1974 mit der ersten Edition von Dungeo
APA, Harvard, Vancouver, ISO, and other styles
24

Starikov, P. P., A. V. Drozdov, and G. A. Shchetinin. "Development of a standard telecommunication control system." Informatization and communication 6 (2021). http://dx.doi.org/10.34219/2078-8320-2021-12-6-144-149.

Full text
Abstract:
the article considers the development of a standard telecommunication control system operating on computers based on russian microprocessors Elbrus and Astra Linux OS. An architecture of a standard telecommunication control system is developed based on modern international approaches with an implementation of special software operating on Astra Linux OS on computers on microprocessors Elbrus.
APA, Harvard, Vancouver, ISO, and other styles
25

Пинчук, А. С. "АНАЛИЗ ОШИБОК КОНФИГУРАЦИИ МЕХАНИЗМОВ СРЕДСТВ ЗАЩИТЫ ИНФОРМАЦИИ И ПРАВ ДОСТУПА В ОС ASTRA LINUX". Вектор научной мысли, № 4(21) (30 травня 2025). https://doi.org/10.58351/2949-2041.2025.21.4.013.

Full text
Abstract:
В первой главе выполнен анализ механизмов защиты информации и разграничения прав доступа в операционной системе специального назначения Astra Linux, а также рассмотрены типовые ошибки их конфигурации. Проведен обзор существующих решений для обнаружения ошибок настроек и выявлены их ограничения. Особое внимание уделено актуальным проблемам обеспечения безопасности вследствие некорректных настроек. По результатам анализа сформулирована задача разработки специализированного программного средства для автоматизированной проверки конфигураций.
APA, Harvard, Vancouver, ISO, and other styles
26

Dorokhin, R. A., O. A. Bezrodnykh, S. N. Smirnov, and V. A. Maystrenko. "Analysis of the features of the protection system of the domestic special-purpose operating system." Dynamics of Complex Systems - XXI century, 2021. http://dx.doi.org/10.18127/j19997493-202101-04.

Full text
Abstract:
The paper considers the task of studying the features of the protection system of the operating system Astra linux 1.6 SE (Further OS Astra 1.6 SE). The basic principles of access control, functional features of protection modules, settings of some configuration files of the operating system, as well as types and features of classification marks are revealed. The result of this work is the proposal for the implementation of the possibility of configuring the basic access control mechanisms without using a graphical shell, the study of the principle of operation of these mechanisms, as well as
APA, Harvard, Vancouver, ISO, and other styles
27

Потапов, А.А., та Е.В. Чулисов. "РАБОТА СЕТЕВОЙ ПОДСИСТЕМЫ В ОТЕЧЕСТВЕННЫХ ОС". Мировая наука, № 1(94) 2025 (18 січня 2025). https://doi.org/10.5281/zenodo.14889548.

Full text
Abstract:
<em>Работа сетевой подсистемы в различных операционных системах, таких как &laquo;Альт&raquo;, РЕД ОС, ROSA и Astra Linux, охватывает ключевые компоненты, обеспечивающие эффективное взаимодействие устройств в сети. В данной статье анализируются настройки домена, DNS, DHCP, маршрутизации, а также управление сетевыми ресурсами и доступом. Постоянное развитие технологий и утилит, таких как alterator-network, NetworkManager и специальные утилиты для настройки интеграции с MSAD, позволяет повысить производительность и безопасность сетевой инфраструктуры. Итогом исследования является определение акт
APA, Harvard, Vancouver, ISO, and other styles
28

Eglitis, Ilgmars, and Vitaly Andruk. "Processing of Digital Plates1.2m of Baldone Observatory Schmidt Telescope." Open Astronomy 26, no. 1 (2017). http://dx.doi.org/10.1515/astro-2017-0006.

Full text
Abstract:
AbstractThe aim of this research is to evaluate accuracy of Plate Processing Method and to perform a detailed study of the Epson Expression 10000XL scanner, which was used to digitize plates from the database collection of the 1.2 m Schmidt Telescope installed in the Baldone Observatory. Special software developed in LINUX/MIDAS/ROMAFOT environment was used for processing the scans. Results of the digitized files with grey gradations of 8- and 16-bits were compared; an estimation of the accuracy of the developed method for rectangular coordinates determination and photometry was made. Errors i
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!