Повышение защищенности сервисов аутентификации путем проведения дополнительной идентификации с использованием оптимального признакового пространства

Bibliographic Details
Parent link:Информационные технологии в науке, управлении, социальной сфере и медицине: сборник научных трудов IV Международной научной конференции, 5-8 декабря 2017 г., Томск/ Национальный исследовательский Томский политехнический университет (ТПУ).— , 2017
Ч. 1.— 2017.— [С. 117-122]
Main Author: Исхаков А. Ю.
Other Authors: Исхаков С. Ю., Мещеряков Р. В.
Summary:Заглавие с титульного экрана
The research focuses on topical issue of the Internet security. In particular, the issue of level increase in security of authentication services through additional identification using optimal feature space is being considered. This article is devoted to the practical application of additional identification technologies in authentication services. The paper presents sets of informative features characterizing the access subject. A classification of methods for identifying the user's work environment is proposed. The article presents the experimental results of intercomparison between scientifically-grounded methods and technologies for identifying the user's work environment.
Language:Russian
Published: 2017
Series:Информационные системы и технологии
Subjects:
Online Access:http://earchive.tpu.ru/handle/11683/46207
Format: Electronic Book Chapter
KOHA link:https://koha.lib.tpu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=626008
Description
Summary:Заглавие с титульного экрана
The research focuses on topical issue of the Internet security. In particular, the issue of level increase in security of authentication services through additional identification using optimal feature space is being considered. This article is devoted to the practical application of additional identification technologies in authentication services. The paper presents sets of informative features characterizing the access subject. A classification of methods for identifying the user's work environment is proposed. The article presents the experimental results of intercomparison between scientifically-grounded methods and technologies for identifying the user's work environment.