THE RUSSIAN’S DIGITAL SOVEREIGNTY AS A TECHNICAL BASIS OF INFORMATION SECURITY
https://doi.org/10.24833/2071-8160-2016-6-51-76-91
Abstract
About the Author
V. V. BukharinRussian Federation
Ph.D., Senior Lecturer, School of Public Administration,
Moscow
References
1. Anureev S.V. Platezhnye sistemy i ikh razvitie v Rossii [Payment systems and their development in Russia]. Moscow, Finansy i statistika Publ., 2011. 288 p. (In Russian).
2. Baluev D.G. Vliianie sovremennykh sotsial'nykh media na informatsionnyi suverenitet Rossii: osnovnye podkhody k issledovaniiu [The impact of social media on information sovereignty of Russia: approaches to the study. State and municipal management]. Gosudarstvennoe i munitsipal'noe upravlenie. Uchenye zapiski SKAGS, 2015, no. 3, pp. 140 - 143. (In Russian).
3. Baturin Ju.M., Zhodzizhskij A.M. Komp'juternaja prestupnost' i komp'juternaja bezopasnost' [Computer crime and computer security]. Moscow, Iuridicheskaia literatura Publ., 1991. 160 p. (In Russian).
4. Bodjen Zh. Metod legkogo poznaniia istorii [Method for the easy knowledge of history]. Moscow, Nauka Publ., 2000. 412 p. (In Russian).
5. Bol'shaia sovetskaia entsiklopediia [The Great Soviet Encyclopedia]. Vol. 25. Moscow, Bol'shaia sovetskaia entsiklopediia, 1976. 600 p. (In Russian).
6. Bondarenko A., Marshalko G., Shishkin V. GOST R 34.12–2015: chego ozhidat' ot novogo standarta? [GOST R 34.12-2015: what to expect from the new standard?]. Information Security - Informacionnaja bezopasnost', 2015, no. 4, pp. 48 - 50. (In Russian).
7. Ishchukova E.A., Bogdanov K.I. Realizatsiia algoritma shifrovaniia Magma s ispol'zovaniem tekhnologii NVidia Cuda [Implementation of the encryption algorithm magma using NVidia CUDA technology]. Mezhdunarodnyi zhurnal prikladnykh i fundamental'nykh issledovanii, 2015, no. 12, pp. 789 - 793. (In Russian).
8. Krapivenskii A.S. Verbal'nyi aspekt kul'turnoi bezopasnosti molodezhi v sotsial'nykh setiakh i blogosfere runeta [Verbal aspect of youth cultural security in social networks and blogosphere of runet]. Sovremennye problemy nauki i obrazovaniia, 2012, no. 2. Available at: http://www.science-education.ru/ru/article/ view?id=5935 (Accessed: 04.12.2016). (In Russian).
9. Kriticheski vazhnye ob"ekty i kiberterrorizm. Chast' 2. Aspekty realizatsii sredstv protivodeistviia [Crucial facilities and cyberterrorism. Part 2: Aspects of implementation of countermeasures]. O.O. Andreev, A.S. Shundeev, S.A. Afonin. Ed. by V.A. Vasenin. Moscow, MTsNMO Publ., 2008. 607 p. (In Russian).
10. Kucheryavyi M.M. Gosudarstvennaia politika informatsionnogo suvereniteta Rossii v usloviiakh sovremennogo global'nogo mira [State Policy Information Sovereignty Russia in Today’s Global World]. Upravlencheskoe konsul'tirovanie, 2014, no. 9, pp. 7 - 14. (In Russian).
11. Malashevich B.M. 50 let otechestvennoi mikroelektronike. Kratkie osnovy i istoriia razvitiia [50 years of domestic microelectronics. Brief history of the foundations and development]. Moscow, Tekhnosfera Publ., 2013. 800 p. (In Russian).
12. Naumov A.O. Mjagkaja sila, cvetnye revoljucii i tehnologii smeny politicheskih rezhimov v nachale XXI veka [Soft power, the color revolutions and the technology change of political regimes at the beginning of the XXI century]. Moscow, Argamak-media Publ., 2016. 274 p. (In Russian).
13. Tanenbaum A., Bos H. Modern operating systems. 4th edition. Prentice Hall, 2014. 1101 p. (Rus. Ed.: Tanenbaum A., Bos H. Sovremennye operatsionnye sistemy. 4th edition. Moscow, 2015. 1120 p.).
14. Shiller V.V., Sheludkov N.N. Rossiiskie sotsial'nye seti kak potentsial'naia ugroza natsional'noi bezopasnosti Rossii (na primere saitov «Odnoklassniki» i «VKontakte») [Russian social networking as a potential threat to Russian national security (example «Odnoklassniki» and «VKontakte»)]. Vestnik Kemerovskogo gosudarstvennogo universiteta, 2013, no. 1 (1), pp. 124 - 129. (In Russian).
15. Steinschaden Ja. Phenomen Facebook: Wie eine Webseite unser Leben auf den Kopf stellt. Carl Ueberreuter Verlag GmbH, 2010. 208 p. (Rus. ed.: Shtainshaden Ia. Sotsial'naia set'. Fenomen Facebook. Sankt-Peterburg, 2011. 223 p.).
16. Becker G.T., Regazzoni F., Paar C., and Burleson W.P. Stealthy Dopant-Level Hardware Trojans. Cryptographic Hardware and Embedded Systems - CHES 2013, vol. 8086 of the series Lecture Notes in Computer Science, pp. 197 - 214.
17. Daemen J., Rijmen V. The Design of Rijndael, AES - The Advanced Encryption Standard. Springer-Verlag, 2002. 238 p.
18. Greenwald G. No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. New York, Metropolitan Books, 2014. 304 p. Available at: http://us.macmillan.com/static/holt/greenwald/NoPlaceToHideDocuments-Uncompressed.pdf (Accessed 07.10.2016).
19. McMahon R., Bennett I. U.S. Internet Providers and the «Great Firewall of China». Council on Foreign Relations, 23.02.2011. Available at: http://www.cfr.org/internet-policy/us-internet-providers-great-firewall-china/ p9856 (Accessed 07.10.2016).
20. O'Neill J. Echelon: Somebody's Listening. Word Association Publ., 2005. 345 p.
21. Paulson T.M. Intelligence Issues & Developm. Nova Publ., 2008. 177 p.
Review
For citations:
Bukharin V.V. THE RUSSIAN’S DIGITAL SOVEREIGNTY AS A TECHNICAL BASIS OF INFORMATION SECURITY. MGIMO Review of International Relations. 2016;(6(51)):76-91. (In Russ.) https://doi.org/10.24833/2071-8160-2016-6-51-76-91