Fuzzy System of Access Distribution Within a Computer Network

Continuous growth of volumes of information resources causes strict requirements to crypto protection on the processing speed of entrance data by the computer system. It is natural that for the solution of this task it is necessary to use hardware realization of known algorithms of cryptographic information protection. The method of the information protection transferred in computer networks by the choice of information encryption algorithm on the basis of fuzzy logic is offered in the paper.

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Resource Details

Provided by:
Journal of Theoretical and Applied Information Technology
Topic:
Security
Format:
PDF