Implied masquerading at confidential information access in computer network

Authors

  • Igor Igorevich Prokopov Author

Abstract

Methods and reasons for implied data access at the absence of the key carrier are considered in the article. Implied access model in the form of an authorization matrix is given. Methods for countering substitution of an operator (that is masquerading) are suggested.

Author Biography

  • Igor Igorevich Prokopov
    associate professor of the Department of Digital Electronic Systems

Published

2014-03-21

Issue

Section

Short messages