Biometric characteristics in the management system of information technology processes
The article presents the research results on the organization of the authentication procedure for access to technological information systems. A rational sequence of user identification for access to information based on the selection of biometric characteristics of a person is proposed. The selecti...
Wedi'i Gadw mewn:
Prif Awduron: | Kuzmenko, V. V., Кузьменко, В. В. |
---|---|
Fformat: | Статья |
Iaith: | English |
Cyhoeddwyd: |
TUENGR GROUP
2021
|
Pynciau: | |
Mynediad Ar-lein: | https://dspace.ncfu.ru/handle/20.500.12258/16637 |
Tagiau: |
Ychwanegu Tag
Dim Tagiau, Byddwch y cyntaf i dagio'r cofnod hwn!
|
Eitemau Tebyg
-
A simulation device model for managing access to confidential information stored in a cloud
gan: Malofey, O. P., et al.
Cyhoeddwyd: (2022) -
Some peculiarities of using GPR for detection of alive humans under the collapsed buildings
gan: Yakushev, V. M., et al.
Cyhoeddwyd: (2018) -
Some peculiarities of using GPR for detection of alive humans under the collapsed buildings
gan: Yakushev, V. M., et al.
Cyhoeddwyd: (2018) -
Synthesis of models for ensuring information security of subjects of critical information infrastructure under destructive influences
gan: Lapina, M. A., et al.
Cyhoeddwyd: (2022) -
Anthropomorphic model of states of subjects of critical information infrastructure under destructive influences
gan: Lapina, M. A., et al.
Cyhoeddwyd: (2022)