<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3.dtd">
<article article-type="research-article" dtd-version="1.3" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="ru"><front><journal-meta><journal-id journal-id-type="publisher-id">neicon</journal-id><journal-title-group><journal-title xml:lang="ru">Наука и научная информация</journal-title><trans-title-group xml:lang="en"><trans-title>Scholarly Research and Information</trans-title></trans-title-group></journal-title-group><issn pub-type="epub">2658-3143</issn><publisher><publisher-name>NP «NEICON»</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="doi">10.24108/2658-3143-2019-2-2-121-128</article-id><article-id custom-type="elpub" pub-id-type="custom">neicon-44</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research Article</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="ru"><subject>БИБЛИОТЕКОВЕДЕНИЕ И ИНФОРМАТИКА</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="en"><subject>LIBRARY AND INFORMATION SCIENCES</subject></subj-group></article-categories><title-group><article-title>ЗАЩИТА НАУЧНО-ОБРАЗОВАТЕЛЬНЫХ РЕСУРСОВ В ИНФОРМАЦИОННО-БИБЛИОТЕЧНЫХ СИСТЕМАХ</article-title><trans-title-group xml:lang="en"><trans-title>PROTECTION OF SCIENTIFIC AND EDUCATIONAL RESOURCES IN INFORMATION AND LIBRARY SYSTEMS</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0003-2587-1120</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Рахматуллаев</surname><given-names>М. А.</given-names></name><name name-style="western" xml:lang="en"><surname>Rakhmatullaev</surname><given-names>M. A.</given-names></name></name-alternatives><bio xml:lang="ru"><p>Марат Алимович Рахматуллаев, д-р техн. наук</p><p>Профессор кафедры информационных библиотечных систем</p></bio><bio xml:lang="en"><p>Marat A. Rakhmatullaev, Dr. Sci. (Engineering), professor</p></bio><email xlink:type="simple">marat56@mail.ru</email><xref ref-type="aff" rid="aff-1"/></contrib><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-2563-0485</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Норматов</surname><given-names>Ш. Б.</given-names></name><name name-style="western" xml:lang="en"><surname>Normatov</surname><given-names>Sh. B.</given-names></name></name-alternatives><bio xml:lang="ru"><p>Шербек Бахтиерович Норматов, докторант кафедры информационных библиотечных систем </p></bio><bio xml:lang="en"><p>Sherbek B. Normatov, PhD student</p></bio><email xlink:type="simple">shb.normatov@gmail.com</email><xref ref-type="aff" rid="aff-1"/></contrib></contrib-group><aff-alternatives id="aff-1"><aff xml:lang="ru">Ташкентский университет информационных технологий им. Мухаммада аль-Хоразмий<country>Узбекистан</country></aff><aff xml:lang="en">Tashkent University of Information Technologies named after Muhammad al-Khwarizmi<country>Uzbekistan</country></aff></aff-alternatives><pub-date pub-type="collection"><year>2019</year></pub-date><pub-date pub-type="epub"><day>24</day><month>04</month><year>2019</year></pub-date><volume>2</volume><issue>2</issue><fpage>121</fpage><lpage>128</lpage><permissions><copyright-statement>Copyright &amp;#x00A9; Рахматуллаев М.А., Норматов Ш.Б., 2019</copyright-statement><copyright-year>2019</copyright-year><copyright-holder xml:lang="ru">Рахматуллаев М.А., Норматов Ш.Б.</copyright-holder><copyright-holder xml:lang="en">Rakhmatullaev M.A., Normatov S.B.</copyright-holder><license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/" xlink:type="simple"><license-p>This work is licensed under a Creative Commons Attribution 4.0 License.</license-p></license></permissions><self-uri xlink:href="https://05x01x01x01x02.ejs-01.elpub.dev/jour/article/view/44">https://05x01x01x01x02.ejs-01.elpub.dev/jour/article/view/44</self-uri><abstract><sec><title>Введение</title><p>Введение. В статье изложены результаты исследований по разработке методов и средств по обеспечению информационной безопасности научно-образовательных ресурсов в информационно-библиотечных системах и корпоративных информационных сетях. Приведен анализ состояния проблемы и существующих подходов обеспечения информационной безопасности электронных библиотек.</p></sec><sec><title>Материалы и методы</title><p>Материалы и методы. Обоснована необходимость защиты научных ресурсов от несанкционированного доступа и применения нечеткой логики для решения проблемы. Приведен анализ состояния проблемы и существующих подходов. В качестве модели и метода решения предлагается нечеткая модель соответствий второго рода, которая позволяет комплексно решить задачу определения угроз при возникшей ситуации, а также дать рекомендации по их устранению. Для формирования базы знаний привлекаются эксперты, которые определяют функции принадлежности в базе знаний «Ситуация — Угроза — Действия по устранению угроз».</p></sec><sec><title>Результаты исследования</title><p>Результаты исследования. Результаты исследований внедряются в составе программного комплекса информационно-библиотечной системы ARMAT++ корпоративной сети электронных библиотек 63 университетов Узбекистана для защиты научной и образовательной информации от несанкционированного доступа. Апробация методов, программ подсистемы и базы экспертных знаний проводится на базе информационно-ресурсных центров по проекту «Виртуальная электронная библиотека Ташкентского университета информационных технологий имени Мухаммада Ал-Хорезми и его филиалов».</p></sec><sec><title>Обсуждение и заключения</title><p>Обсуждение и заключения. Применение аппарата нечеткой логики для формирования базы знаний вида «Ситуация — Угроза — Действия по устранению угроз» в информационно-библиотечных системах существенно повышает степень защиты ценных информационных ресурсов от несанкционированного доступа.</p></sec></abstract><trans-abstract xml:lang="en"><sec><title>Introduction</title><p>Introduction. The authors of the article highlight the results of research on the development of methods and tools for ensuring the information security of scientific and educational resources in information library systems and corporate information networks. The analysis of the state of the problem and the existing approaches on this topic are given too.</p></sec><sec><title>Materials and Methods</title><p>Materials and Methods. The approach justifies the need to protect scientific resources from unauthorized access and the use of fuzzy logic to solve the problem. As a model and solution method, a fuzzy model correspondences is proposed, which makes it possible to comprehensively solve the problem of identifying threats in the event of a situation, as well as provide recommendations on how to eliminate them. For the formation of a knowledge base, experts are involved who determine the functions of belonging to knowlege base “Situation — Threats — Actions to eliminate the threats”.</p></sec><sec><title>Results</title><p>Results. The research results are being implemented as part of the ARMAT++ information library system of the corporate network of electronic libraries of 63 Uzbekistan universities for the protection of scientific and educational information from unauthorized access. Testing of the methods, programs of the subsystem and the expert knowledge base are carried out on the basis of information and resource centers under the project “Virtual electronic library of the Tashkent University of Information Technologies named after Muhammad Al-Khorezmi and its five branches”.</p><p>Discussion and Conclusions. The use of the apparatus of fuzzy logic for the formation of a knowledge base of the “Situation — Threats — Actions to eliminate the threats” type in information library systems significantly increases the degree of protection of valuable information resources from unauthorized access.</p></sec></trans-abstract><kwd-group xml:lang="ru"><kwd>информационная безопасность</kwd><kwd>библиотечные системы</kwd><kwd>корпоративная сеть</kwd><kwd>научно-образовательные ресурсы</kwd><kwd>защита информации</kwd></kwd-group><kwd-group xml:lang="en"><kwd>information security</kwd><kwd>library systems</kwd><kwd>corporate network</kwd><kwd>scientific and educational resources</kwd><kwd>digital library</kwd></kwd-group><funding-group xml:lang="ru"><funding-statement>Ташкентский университет информационных технологий имени Мухаммада ал-Хорезми</funding-statement></funding-group></article-meta></front><back><ref-list><title>References</title><ref id="cit1"><label>1</label><citation-alternatives><mixed-citation xml:lang="ru">Федякова Н.Н., Ивойлов Э.М., Табачников Р.А. Обеспечение информационной безопасности электронной библиотеки. URL: https://docplayer.ru/43934328-Obespechenie-informacionnoybezopasnosti-elektronnoy-biblioteki.html</mixed-citation><mixed-citation xml:lang="en">Fedyakova N.N., Ivoylov E.M., Tabachnikov R.A. Ensuring the information security of the electronic library. Available at: https://docplayer.ru/43934328-Obespechenie-informacionnoy-bezopasnosti-elektronnoy-biblioteki.html (In Russ.).</mixed-citation></citation-alternatives></ref><ref id="cit2"><label>2</label><citation-alternatives><mixed-citation xml:lang="ru">Thompson S. Helping the hacker? Library information, security and social engineering. Information Technology and Libraries. 2006;25(4):222–225. https://doi.org/10.6017/ital. v25i4.3355</mixed-citation><mixed-citation xml:lang="en">Thompson S. Helping the hacker? Library information, security and social engineering. Information Technology and Libraries. 2006;25(4):222–225. https://doi.org/10.6017/ital.v25i4.3355</mixed-citation></citation-alternatives></ref><ref id="cit3"><label>3</label><citation-alternatives><mixed-citation xml:lang="ru">Rodionova Z.V., Bobrov L.K. Protection of the Information Resources of a Library Based on Analysis of Business Processes. Scientific and Technical Information Processing. 2016;43(1):20–27.</mixed-citation><mixed-citation xml:lang="en">Rodionova Z.V., Bobrov L.K. Protection of the Information Resources of a Library Based on Analysis of Business Processes. Scientific and Technical Information Processing. 2016;43(1):20–27.</mixed-citation></citation-alternatives></ref><ref id="cit4"><label>4</label><citation-alternatives><mixed-citation xml:lang="ru">Kuzma J. European digital libraries: web security vulnerabilities. Library Hi Tech. 2010;28(3):402–413. https://doi.org/10.1108/07378831011076657</mixed-citation><mixed-citation xml:lang="en">Kuzma J. European digital libraries: web security vulnerabilities. Library Hi Tech. 2010;28(3):402–413. https://doi.org/10.1108/07378831011076657</mixed-citation></citation-alternatives></ref><ref id="cit5"><label>5</label><citation-alternatives><mixed-citation xml:lang="ru">Ismail R., Zainab A.N. Information systems security in special and public libraries: an assessment of status. Malaysian Journal of Library &amp; Information Science. 2011;16(2):45–62. URL: https://mjlis.um.edu.my/article/view/6697</mixed-citation><mixed-citation xml:lang="en">Ismail R., Zainab A.N. Information systems security in special and public libraries: an assessment of status. Malaysian Journal of Library &amp; Information Science. 2011;16(2):45–62.</mixed-citation></citation-alternatives></ref><ref id="cit6"><label>6</label><citation-alternatives><mixed-citation xml:lang="ru">Wilco E. Information Assets and their Value. 6th Twente Student Conference on IT, Enschede, 2nd February, 2007, University of Twente. URL: https:// www.semanticscholar.org/paper/InformationAssets-and-their-Value-Engelsman/a9c3f38f978b1 24d077fa99fd169e5c2dfb28a65</mixed-citation><mixed-citation xml:lang="en">Wilco E. Information Assets and their Value. 6th Twente Student Conference on IT, Enschede, 2nd February, 2007, University of Twente. Available at: https://www.semanticscholar.org/paper/Information-Assets-and-their-Value-Engelsman/a9c3f38f978b124d077fa99fd169e5c2dfb28a65</mixed-citation></citation-alternatives></ref><ref id="cit7"><label>7</label><citation-alternatives><mixed-citation xml:lang="ru">Breeding M. The Current State of Privacy and Security of Automation and Discovery Products. Library Technology Reports. 2016;52(4):13–28. URL: https://journals.ala.org/index.php/ltr/article/view/5974/7608</mixed-citation><mixed-citation xml:lang="en">Breeding M. The Current State of Privacy and Security of Automation and Discovery Products. Library Technology Reports. 2016;52(4):13–28. Available at: https://journals.ala.org/index.php/ltr/article/view/5974/7608</mixed-citation></citation-alternatives></ref><ref id="cit8"><label>8</label><citation-alternatives><mixed-citation xml:lang="ru">Zadeh L.A. Fuzzy sets. The Journal of Symbolic Logic. 1973;38(4):656–657. https://doi.org/10.2307/2272014</mixed-citation><mixed-citation xml:lang="en">Zadeh L.A. Fuzzy sets. The Journal of Symbolic  Logic. 1973;38(4):656–657. https://doi.org/10.2307/2272014</mixed-citation></citation-alternatives></ref><ref id="cit9"><label>9</label><citation-alternatives><mixed-citation xml:lang="ru">Rakhmatullaev M. Increase of determinacy of information environment for intellectualization of information retrieval. Proceeding of International conference. WCIS 2014. Eighth World Conference on Intelligent Systems for Industrial Automation. 2014;329–334.</mixed-citation><mixed-citation xml:lang="en">Rakhmatullaev M. Increase of determinacy of information environment for intellectualization of information retrieval. Proceeding of International conference. WCIS 2014. Eighth World Conference on Intelligent Systems for Industrial Automation. 2014;329–334.</mixed-citation></citation-alternatives></ref><ref id="cit10"><label>10</label><citation-alternatives><mixed-citation xml:lang="ru">Рахматуллаев М.А. Композиционная модель соответствий для решения задач нечеткой технологической среды. Автоматика и вычислительная техника. 1993;6:33–40.</mixed-citation><mixed-citation xml:lang="en">Rakhmatullayev M. Compositional correspondence model for solving problems of a fuzzy technological environment. Automatic Control and Computer Sciences. 1993;6:33–40 (In Russ.).</mixed-citation></citation-alternatives></ref></ref-list><fn-group><fn fn-type="conflict"><p>The authors declare that there are no conflicts of interest present.</p></fn></fn-group></back></article>
