MATERIALS OF THE XVI INTERNATIONAL SCIENTIFIC AND PRACTICAL CONFERENCE ★ March 30 - April 7, 2020
Biological fouling reduces heat exchange in condensing and cooling equipment
and cooling towers, reduces the water throughput through pipes and pollutes the
recycled water due to the death and deposition of bioorganisms. Changes in
temperature, flow rate, and chemical composition in turn affect electrochemical
corrosion. Bacteria can affect electrochemical corrosion in different ways. Guillam
investigating microbiological corrosion of copper, suggested that all bacteria are
divided into three groups: 1)acting as corrosion inhibitors; 2)non-reducing bacteria that
cause limited destruction of metals with the formation of hydroxides; 3)proteoditic and
reducing bacteria-corrosion catalysts that contribute to the formation of metal
complexes.
Thus, the issue of corrosion control in circulating systems operating on water
of high mineralization requires special detailed study.
L iterature
1. Shabalin A. F. Recycling water supply of industrial enterprises, - Moscow:
Stroizdat,1972,-296p.
2. Negreet B. F., Farkhadov M. A., Abramov D. M., Alekperov A. Y. Corrosion
of steel in cooling systems and methods of protection. - Baku: Azerneshr, 1971.-118p.
3. Kucherenko D. I., Gladkov V. N., Recycled water supply. - Moscow:
Stroizdat, 1980,-169p.
4. Yakovlev D. G., Polyakov S. I. Improving the efficiency of operation of
recycling water supply systems in the petrochemical industry - Moscow: UNIT
Eneftekhim, 1976-40p.
169
Science without borders - 2020 ★ Volume 14
IMPROVING THE MODEL OF INFORMATION SECURITY WITH A
MANDATORY ACCESS CONTROL POLICY
M ir-khusan Kadirov, Shohida Akbarova, G avhar Vahidova
Tashkent State Technical University, Tashkent.
ABSTRACT: A conceptual model for improving information security with a
mandatory access control policy has been developed. While improving the model for
increasing information security, the approach of information clustering was used.
KEYW ORDS: access, privacy, user, security policy, consolidation of
credential policies, immunocomputing.
In the proposed approach of phased classification of information entities, a tree
of objects of protection is built, the hierarchy levels of which reflect the relationship of
the subjects of protection with the status of owners of objects of protection. The tree
structure of the representation of objects of protection is implemented through a
hierarchy of ownership rights of subjects of objects. The hierarchical dependence
between the objects of protection is manifested through a hierarchy of degrees of
secrecy of information and a hierarchy of classification of subjects-owners of objects.
The trunk of the tree of objects is built according to the degree of access to information
of the entities that own the objects, and the links between the objects are set depending
on the secrecy of the information stored or processed in the objects of protection.
“Branching” occurs due to the creation of new objects by owner entities from
the main directories, the so-called “sons” of the object. Moreover, at each level of the
tree hierarchy, a more detailed classification of objects of protection is carried out
according to the following 4 categories (Figure 1):
170
Do'stlaringiz bilan baham: |