APPLICATION OF VIRTUALIZATION TECHNOLOGY TO ORGANIZE ACCESS CONTROL
Annotation
An overview of the advantages of open-source operating systems in information security system design is presented. Virtualization technology is discussed as an effective way to protect information systems. An example of container virtualization with the construction of an adaptive model of an access control system on an ARM processor is given. The assessment of the probability of non-stationary penetration into the system is 2%, which confirms the effectiveness of the proposed solution and its applicability for building an adaptive access control system.
Keywords
Постоянный URL
Articles in current issue
- PROSPECTS OF APPLICATION OF A SPECIALIZED COMMUNICATING COMPUTER IN THE INSTRUMENT COMPLEX OF AUTOMATIC HYDROMETEOROLOGICAL STATION
- EVALUATION OF THE EFFICIENCY OF CHANNELS SEPARATION IN A QUEUING SYSTEM WITH AN UNLIMITED QUEUE
- NEURAL NETWORKS APPLICATION TO NETWORK ATTACK DISCOVERY
- APPLICATION OF VIRTUALIZATION TECHNOLOGY TO ORGANIZE ACCESS CONTROL
- MODEL OF DATA TRAFFIC STORAGE MANAGEMENT
- MODEL OF THE PROCESS OF EXTREME LIGHT SCATTERING BY ATMOSPHERIC AEROSOL PARTICLE
- METHOD FOR SOLVING THE INVERSE PROBLEM OF LIDAR SOUNDING OF A WEAKLY TURBID ATMOSPHERE
- METHOD OF NONPARAMETRIC STATISTICAL ANALYSIS OF HOMOGENEITY OF ECOLOGICAL INDICATORS OF WATER BODIES
- METHODOLOGY FOR ASSESSING THE HYDROSTATIC STABILITY OF RETAINING WALLS
- SOLVING THE PROBLEM OF ENVIRONMENTAL MONITORING OF A PORT WATER AREA USING A DISTRIBUTED SYSTEM OF SENSORS
- METHOD FOR MEASURING A CELESTIAL BODY HEIGHT FROM THE SKY DIGITAL PHOTOGRAPH
- SMALL-SIZED UNDERWATER VEHICLE FOR REMOTE CONTROL OF TECHNICAL WORKS