INFORMATION SECURITY ANALYSIS ALGORITHM IN CLOUD TECHNOLOGY
Authors: Jafarova Shalala Mehdi kizi, Ph.D
Affiliation: Sumgayit State University
Keywords: Security, server, browser, cloud service, provider, Petri network
ABSTRACT. There are different approaches to information security modeling in cloud technology. Unlike other modeling devices, the Petri network (PN) is a more universal device. This is justified by the fact that the information used is modeled by the PN and an assessment of security is made by analyzing the main properties of the PN outside the system.
1.Aalst W. The Application of Petri Nets to Workflow Management. // The Journal of Circuits, Systems and Computers,Vol. 8, No. 1,1998, p.21-66.
2.Akhmedov M.A., Mustafaev V.A., Huseynzade Sh.S. Presentation and analysis of fuzzy rules productions using a modiffed fuzzy Petri nets / The 5th International Conference on Control and optimization With Industrial applications. 27 - 29 Auqust 2015. pp.184-186.
3.Frank A. Using relation algebra for the analysis of Petri Nets in a CASE tool based approach ./ Software Engineering and Formal Methods, Proceedings of the Second International Conference, Dortmund Univ., Germany, 2002, p. 396 - 405.
4.Gillam, Lee. Cloud Computing: Principles, Systems and Applications / Nick Antonopoulos, Lee Gillam. — L.: Springer, 2010. — 379 p. — (Computer Communications and Networks). — ISBN 9781849962407
5.Mell, Peter and Grance, Timothy. The NIST Definition of Cloud Computing. Recommendations of the National Institute of Standards and Technology. NIST (20 October 2011)