Please use this identifier to cite or link to this item:
https://dspace.ncfu.ru/handle/20.500.12258/19610
Title: | A simulation device model for managing access to confidential information stored in a cloud |
Authors: | Malofey, O. P. Малофей, О. П. Bondar, V. V. Бондарь, В. В. |
Keywords: | Algorithm;Simulation modeling;Biometric features;information resource;Information security;Personal identification and authentication |
Issue Date: | 2022 |
Publisher: | Springer Science and Business Media Deutschland GmbH |
Citation: | Troshkov, A., Malofey, A., Malofey, O., Bondar, V. A simulation device model for managing access to confidential information stored in a cloud // Lecture Notes in Networks and Systems. - 2022. - Том 424. - Стр.: 291 - 300. - DOI10.1007/978-3-030-97020-8_27 |
Series/Report no.: | Lecture Notes in Networks and Systems |
Abstract: | The article offers a look at a model to be used for information resource protection in clouds, which allows managing authorized access to segments of the resources based on employees’ biometric features. Ensuring a higher level of confidential data protection takes convenient access, which implies using biometric features. This process is impossible to be studied to the fullest with no model building. By using research methods like measurement and comparison subject to selected features, which characterize the management system operation, data storage and processing, ratios were obtained to be used for analyzing the outcomes of external effects caused on the recognition system, as well as for comparing incoming data. Such a study will result in developing a simulation device model, which is proposed to be employed for creating an access control system for data resources. The reliability of the model, as well as the calculation convergence between the impact and the system response were evaluated based on Fechner’s mathematics. The integrated model can be incorporated into the data security employees’ peripheral devices at automated workplaces, which will enhance significantly the durability of the protected data. |
URI: | http://hdl.handle.net/20.500.12258/19610 |
Appears in Collections: | Статьи, проиндексированные в SCOPUS, WOS |
Files in This Item:
File | Size | Format | |
---|---|---|---|
scopusresults 2178 .pdf Restricted Access | 63.1 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.