Implied masquerading at confidential information access in computer network
Бесплатный доступ
Methods and reasons for implied data access at the absence of the key carrier are considered in the article. Implied access model in the form of an authorization matrix is given. Methods for countering substitution of an operator (that is masquerading) are suggested.
Implied access, masquerading, confidential information
Короткий адрес: https://sciup.org/147154778
IDR: 147154778
Статья научная