|

Technique of Administering of Protection of Data Access in Automated System of Enterprise Management

Authors: Chernen’kii V.M., Ghaiad Issam Published: 18.03.2014
Published in issue: #4(69)/2007  
DOI:

 
Category: Informatics & Computing Technology  
Keywords:

A problem of providing the protection of data access in any information systems is considered. The peculiarity of the proposed approach is creating the distributed complex of methods on each data protection including creation of additional key records, also provided with protection. Theoretical means is offered which describes stages of creation and exploitation of the protection system as a whole. Operations of chains transformation and factors of efficiency of distribution of protection methods are considered.