On some methods of storing data in the cloud for a given time

B Yergaliyeva, Y Seitkulov… - TELKOMNIKA …, 2022 - telkomnika.uad.ac.id
In this work we study some methods of storing data in the cloud for a given time using secret
sharing technology. Such problems are especially relevant in the context of the rapid …

Technology of Creation and Functioning of a Multimedia Educational Portal for Distance Learning of School Children in the Republic of Kazakhstan Under Pandemic …

A Boranbayev, S Boranbayev… - Intelligent Systems and …, 2022 - Springer
In the context of the COVID-19 pandemic, schools in the Republic of Kazakhstan have
switched to distance learning. In this regard, the role of information technology, computer …

Graphical visualization of the connections of involved users and identifying influential spreaders in a social network

S Mussiraliyeva, G Baispay, R Ospanov… - … on Electrical and …, 2022 - ieeexplore.ieee.org
According to the latest research, the use of social media to track the spread of radical ideas
and extremist threats has attracted the attention of researchers for over 10 years. In recent …

Modeling Domestic Passenger Transportation in the Republic of Kazakhstan During Pandemic Period

A Boranbayev, S Boranbayev, T Muratov… - Proceedings of the …, 2022 - Springer
In the article, a model was developed to model domestic passenger traffic on the territory of
the Republic of Kazakhstan, which, in particular, includes such indicators as ticket prices …

Software System for Determining the Level of Reliability and Fault-Tolerance of Information Systems

A Boranbayev, S Boranbayev, N Sissenov… - Proceedings of the …, 2022 - Springer
This article is written about techniques how to determine the level of fault tolerance of
Information Systems (IS). On the basis of the proposed methods and approach, a software …

Methods and techniques of information security risk management during assessment of information systems

S Boranbayev, A Amrenov, A Nurusheva… - Future of Information …, 2022 - Springer
This article proposes methods for managing the security risks of information systems. The
proposed methods were tried in practice to make an assessment of the risks of information …

[PDF][PDF] METHODS FOR THE SECURE USE OF EXTERNAL SERVERS TO SOLVE COMPUTATIONALLY-COMPLEX PROBLEMS WITH SECRET PARAMETERS

BB YERGALIYEVA, YN SEITKULOV… - Journal of Theoretical …, 2022 - jatit.org
In this work, we study methods for the secure use of external insecure computers (servers)
when solving computationally-complex problems with secret parameters. This problem is …

Development of a Human Identification Software System in Real Time

A Boranbayev, S Boranbayev, M Amirtaev… - Intelligent Systems and …, 2022 - Springer
The article is devoted to the recognition and identification of a person in real time from a
video stream. The methodology for creating a software system and the results of its testing …

Method and Information Technology to Support Decision-Making for Determining the Level of Reliability of Information Systems

A Boranbayev, S Boranbayev, N Sissenov… - Future of Information …, 2022 - Springer
The paper is about the development of a method and information technology (IT) for
decision support to determine the level of reliability of systems. The method and the …

АНАЛИТИЧЕСКИЙ ОБЗОР И МОДЕЛИРОВАНИЕ КРИПТОГРАФИЧЕСКОЙ СИСТЕМЫ РЕЗЕРВНОГО ХРАНЕНИЯ КОНФИДЕНЦИАЛЬНЫХ ДАННЫХ В …

О Тасмагамбетов, Е Сейткулов… - Вестник …, 2022 - vestnik.alt.edu.kz
Аннотация Данная работа посвящается обзору и моделированию криптографической
системы резервного хранения конфиденциальных данных в защищенных серверах, а …