For example,Бобцов

APPLICATION OF VIRTUALIZATION TECHNOLOGY TO ORGANIZE ACCESS CONTROL

Annotation

An overview of the advantages of open-source operating systems in information security system design is presented. Virtualization technology is discussed as an effective way to protect information systems. An example of container virtualization with the construction of an adaptive model of an access control system on an ARM processor is given. The assessment of the probability of non-stationary penetration into the system is 2%, which confirms the effectiveness of the proposed solution and its applicability for building an adaptive access control system.

Keywords

Articles in current issue