|

Method to build the system of limiting unauthorised access to the confidential data in Internet

Authors: Vorobiev G.N., Lobach O.V. Published: 14.04.2015
Published in issue: #2(34)/1999  
DOI:

 
Category: Informatics, Computer Engineering and Control | Chapter: Computing Systems and their Elements  
Keywords:

A model of the user’s authentication system at the remote access to the confidential data in the open networks, is proposed. The model allows to avoid the Transmission Control Protocol shortcomings in the access security.