Method to build the system of limiting unauthorised access to the confidential data in Internet
Authors: Vorobiev G.N., Lobach O.V. | Published: 14.04.2015 |
Published in issue: #2(34)/1999 | |
DOI: | |
Category: Informatics, Computer Engineering and Control | Chapter: Computing Systems and their Elements | |
Keywords: |
A model of the user’s authentication system at the remote access to the confidential data in the open networks, is proposed. The model allows to avoid the Transmission Control Protocol shortcomings in the access security.