АУТЕНТИФИКАЦИЯ В РАСПРЕДЕЛЕННЫХ ГЕТЕРОГЕННЫХ СИСТЕМАХ С ДИНАМИЧЕСКОЙ АРХИТЕКТУРОЙ
Анотація
Authentication methods in distributed heterogeneous
systems with dynamic architecture
With increasing amounts of data processing large amounts of information is becoming more difficult. The traditional way to solve this problem is to build dedicated high-performance distributed environments. Since the transmitted data must be protected against theft and distortion, the choice of authentication method that could effectively be used must be made. In this paper, the aim is to carry out an analytical review of the existing authentication methods.
Посилання
Ars Technica. New attack cracks WEP in record – [Электронный ресурс] – Режим доступа: http://arstechnica.com/gadgets/2007/04/new-attack-cracks-wep-in-record-time– Электрон. текстовые данные (дата обращения: 26.03.2016).
Guniper Networks. Understanding WPA-PSK and WPA2-PSK Authentication – [Электронный ресурс] – Режим доступа: http://www.juniper.net/techpubs/en_US/network-director1.1/topics/concept/wireless-wpa-psk-authentication.html - Электрон. текстовые данные (дата обращения: 26.03.2016).
Сетевая аутентификация на практике – [Электронный ресурс] – Режим доступа: http://citforum.ru/nets/articles/authentication/ – Электрон. текстовые данные (дата обращения: 26.03.2016).
##submission.downloads##
Опубліковано
Як цитувати
Номер
Розділ
Ліцензія
Авторське право (c) 2016 Николай Александрович Алексеев, Роман Михайлович Мазанка
Ця робота ліцензується відповідно до Creative Commons Attribution 4.0 International License.
Authors who submit to this conference agree to the following terms:a) Authors retain copyright over their work, while allowing the conference to place this unpublished work under a Creative Commons Attribution License, which allows others to freely access, use, and share the work, with an acknowledgement of the work's authorship and its initial presentation at this conference.
b) Authors are able to waive the terms of the CC license and enter into separate, additional contractual arrangements for the non-exclusive distribution and subsequent publication of this work (e.g., publish a revised version in a journal, post it to an institutional repository or publish it in a book), with an acknowledgement of its initial presentation at this conference.
c) In addition, authors are encouraged to post and share their work online (e.g., in institutional repositories or on their website) at any point before and after the conference.