The formal model of research on authentication systems
Автор: Makedonskiy Sergey Aleksandrovich, Sukharevskaya Ekaterina Vitalyevna
Журнал: НБИ технологии @nbi-technologies
Рубрика: Инновации в информатике, вычислительной технике и управлении
Статья в выпуске: 3 (26), 2017 года.
Бесплатный доступ
Currently, the information systems are the most important resource and necessary tool in almost any field. They help to solve various problems, and this led to the heterogeneity of information systems and information stored in them. It is very important to maintain the security of any information system. Providing information security means organizing a comprehensive system of protection of access to information system, to prevent unauthorized access to data. Therefore, before working with modern information systems, the user shall complete the identification, authentication and authorization. Identification: the subject reports identifying information about themselves (name, etc.). Authentication: the system checks whether the subject is who they claim to be. Authorization: the system checks the user's rights to access resources. The authentication process is the basis for providing secure access, for establishing a trust relationship between the server and the user. So, it is important to study authentication systems. The paper deals with the problem of information security in modern information systems. The authors describe and analyze existing authentication systems, the principles of their work, their advantages and disadvantages. The criteria for their evaluation have been formulated, and the formal model of research on authentication systems has been developed.
Authentication, authentication system, information, information system, information security, protection of information, digital signature, password, biometric
Короткий адрес: https://sciup.org/149129729
IDR: 149129729 | DOI: 10.15688/jvolsu10.2017.3.3