CONTROL OF ENERGY EFFICIENCY IN INDUSTRY AND HOUSING AND COMMUNAL SERVICES
Sign | Register
UDC 681.586'33, 681.5.015.87
Implied masquerading at confidential information access in computer network
Igor Igorevich Prokopov, associate professor of the Department of Digital Electronic Systems, South Ural State University, Chelyabinsk, Russian Federation, crts@drts.susu.ac.ru
Abstract
Methods and reasons for implied data access at the absence of the key carrier are considered in the article. Implied access model in the form of an authorization matrix is given. Methods for countering substitution of an operator (that is masquerading) are suggested.
Keywords
implied access, confidential information, masquerading
References
1. Stollings, V. Kriptografiya i zashchita setej: principy i praktika: per. s angl. / V. Stollings. – 2-e izd. – M.: Izdat. dom «Vil'yams», 2001. – 672 s.
2. Horev, A.A. Tekhnicheskaya zashchita informacii: ucheb. posobie dlya studentov vuzov. V 3 t. T. 1: Tekhnicheskie kanaly utechki informacii / A.A. Horev. – M.: NPC «Analitika», 2008. – 436 s.
3. Brehgg, R. Bezopasnost' setej. Polnoe rukovodstvo: per. s angl. / R. Brehgg, M. Rods-Ousli, K. Strassberg. – M.: Izd-vo «EHKOM», 2006. – 912 s.
Source
Bulletin of the South Ural State University. Ser. Computer Technologies, Automatic Control, Radio Electronics, 2012, iss. 16, no. 23 (282), pp. 164-165. (in Russ.) (Brief Reports)