Повышение защищенности сервисов аутентификации путем проведения дополнительной идентификации с использованием оптимального признакового пространства
| Parent link: | Информационные технологии в науке, управлении, социальной сфере и медицине: сборник научных трудов IV Международной научной конференции, 5-8 декабря 2017 г., Томск/ Национальный исследовательский Томский политехнический университет (ТПУ).— , 2017 Ч. 1.— 2017.— [С. 117-122] |
|---|---|
| Main Author: | |
| Other Authors: | , |
| Summary: | Заглавие с титульного экрана The research focuses on topical issue of the Internet security. In particular, the issue of level increase in security of authentication services through additional identification using optimal feature space is being considered. This article is devoted to the practical application of additional identification technologies in authentication services. The paper presents sets of informative features characterizing the access subject. A classification of methods for identifying the user's work environment is proposed. The article presents the experimental results of intercomparison between scientifically-grounded methods and technologies for identifying the user's work environment. |
| Language: | Russian |
| Published: |
2017
|
| Series: | Информационные системы и технологии |
| Subjects: | |
| Online Access: | http://earchive.tpu.ru/handle/11683/46207 |
| Format: | Electronic Book Chapter |
| KOHA link: | https://koha.lib.tpu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=626008 |
| Summary: | Заглавие с титульного экрана The research focuses on topical issue of the Internet security. In particular, the issue of level increase in security of authentication services through additional identification using optimal feature space is being considered. This article is devoted to the practical application of additional identification technologies in authentication services. The paper presents sets of informative features characterizing the access subject. A classification of methods for identifying the user's work environment is proposed. The article presents the experimental results of intercomparison between scientifically-grounded methods and technologies for identifying the user's work environment. |
|---|