AUTHENTIFICATION USER TOOLS IN CORPORATIVE INFORMATION SYSTEMS AND CLOUD COMPUTING AREAS
Analysis elements of users work in information corporative systems (ICS) are done. The mathematical model of social authentification in ICS allows on given quality of unsatisfactory marks to calculate the probability of successful authentification with the use of time primoderatin calculating. It al...
Main Authors: | U. A. Vishniakou, M. M. Gongag Sas |
---|---|
Format: | Article |
Language: | Russian |
Published: |
Educational institution «Belarusian State University of Informatics and Radioelectronics»
2019-06-01
|
Series: | Doklady Belorusskogo gosudarstvennogo universiteta informatiki i radioèlektroniki |
Subjects: | |
Online Access: | https://doklady.bsuir.by/jour/article/view/660 |
Similar Items
-
A Threshold Cryptosystem in Secure Cloud Computations
by: N. P. Varnovskij, et al.
Published: (2018-10-01) -
Monitoring of information security incidents in the cloud computing at small business
by: A. N. Pruzan, et al.
Published: (2019-06-01) -
Problems of Designing Complex Information Security System for Cloud Resources in the Republic of Belarus
by: V. P. Kochyn, et al.
Published: (2021-10-01) -
Batch Symmetric Fully Homomorphic Encryption Using Matrix Polynomials
by: Ph. Burtyka
Published: (2018-10-01) -
An algorithm for using a cross-platform mobile application to protect information in cloud storage
by: A. R. Gazizov
Published: (2022-08-01)