Technique of Administering of Protection of Data Access in Automated System of Enterprise Management
Authors: Chernen’kii V.M., Ghaiad Issam | Published: 18.03.2014 |
Published in issue: #4(69)/2007 | |
DOI: | |
Category: Informatics & Computing Technology | |
Keywords: |
A problem of providing the protection of data access in any information systems is considered. The peculiarity of the proposed approach is creating the distributed complex of methods on each data protection including creation of additional key records, also provided with protection. Theoretical means is offered which describes stages of creation and exploitation of the protection system as a whole. Operations of chains transformation and factors of efficiency of distribution of protection methods are considered.