Aleksei A. Sychugov1, Elvir M. Akhmetshin2*, Vyacheslav M. Grishin3, Raisa N. Shpakova4, Andrei V. Plotnikov5


1Department of Information Security, Tula State University, 92 Lenin Ave., Tula, Russian Federation

2Department of Economy and Management, Elabuga Institute of Kazan Federal University, 89 Kazanskaya Str., Elabuga, Russian Federation

3Department No.604 “System Analysis and Management”, Moscow Aviation Institute, 4 Volokolamskoe shosse, Moscow, Russian Federation

4Department of Regional Governance and National Policy, Moscow State Institute of International Relations (MGIMO), 76 Vernadsky Ave., Moscow, Russian Federation

5Department of Management, Perm State Agro-Technological University named after Academician D.N. Pryanishnikov, 23 Petropavlovskaya Str., Perm, Russian Federation

*Corresponding Author Email:

This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

In distributed information systems the owner of the information can make a decision only concerning the transfer of information to a particular DIS node for calculations and cannot control the security of information during its processing on the node. Thus, in this case there is a question of information owner’s trust to a specific DIS node. The authors describe an experiment conducted in order to verify the quality of approach, which allows evaluating the level of trust based on the featureless pattern recognition. The authors found that this algorithm will allow to prevent the transfer of confidential information on unreliable DIS elements, also it will require more careful attention to be paid to the protection of separate DIS components.