TO THE QUESTION ABOUT RELIABILITY OF IDENTIFICATION OF USERS IN ENVIRONMENT OF CLOUDY COMPUTING
Abstract and keywords
Abstract (English):
The title deals with interpretation of basic rules of organising identification of users in information systems based on cloudy computing technologies, there are provided recommendations for developers, maintenance personnel and system administration.

Keywords:
cloudy computing, identification, information safety
References

1. Sychev A.V. Teoriya i praktika razrabotki sovremennyh klientskih veb-prilozheniy // Internet-universitet informacionnyh tehnologiy. URL: http://www.intuit.ru/department/internet/thpdevweba/24/thpdevweba_24.html (data obrascheniya: 04.12.2013).

2. Informacionnaya bezopasnost' pri oblachnyh vychisleniyah: problemy i perspektivy / M.Ya. Bekker [i dr.] // Nauchno-tehnicheskiy vestnik SPbGU ITMO. 2011. № 1 (71). S. 97-102.

3. Kim Cameron’s. Identity Weblog. URL: http://www.identityblog.com/stories/2004/12/09/ thelaws.html (data obrascheniya: 04.12.2013).

Login or Create
* Forgot password?