{"title":"基于功能表的用户访问控制中用户分组可靠方法的开发","authors":"Inomjon Yarashov","doi":"10.1109/ICISCT55600.2022.10146787","DOIUrl":null,"url":null,"abstract":"Digitization in various fields and the development of digital technologies are giving rise to information security issues such as security management. In addition, a user-friendly method based on the properties of the object should be proposed. Of course, the system will be able to evaluate itself based on improvement criteria. In accordance with the criteria, a formula is presented that evaluates the reliable distribution based on the entered criteria, the base points necessary for the invariant method are selected when choosing the best path of action of the system participants with respect to the defined areas. When selecting the center points of the circles, the observation is determined according to the location density of the wells, to reduce the complexity of the selection of the base points and the reliable grouping problem, the reliable part is divided into sets, a knowledge base is formed, and the values of the knowledge base store the values considered to be highly effective.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Development of a reliable method for grouping users in user access control based on a Functioning table\",\"authors\":\"Inomjon Yarashov\",\"doi\":\"10.1109/ICISCT55600.2022.10146787\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Digitization in various fields and the development of digital technologies are giving rise to information security issues such as security management. In addition, a user-friendly method based on the properties of the object should be proposed. Of course, the system will be able to evaluate itself based on improvement criteria. In accordance with the criteria, a formula is presented that evaluates the reliable distribution based on the entered criteria, the base points necessary for the invariant method are selected when choosing the best path of action of the system participants with respect to the defined areas. When selecting the center points of the circles, the observation is determined according to the location density of the wells, to reduce the complexity of the selection of the base points and the reliable grouping problem, the reliable part is divided into sets, a knowledge base is formed, and the values of the knowledge base store the values considered to be highly effective.\",\"PeriodicalId\":332984,\"journal\":{\"name\":\"2022 International Conference on Information Science and Communications Technologies (ICISCT)\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-09-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Information Science and Communications Technologies (ICISCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICISCT55600.2022.10146787\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISCT55600.2022.10146787","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Development of a reliable method for grouping users in user access control based on a Functioning table
Digitization in various fields and the development of digital technologies are giving rise to information security issues such as security management. In addition, a user-friendly method based on the properties of the object should be proposed. Of course, the system will be able to evaluate itself based on improvement criteria. In accordance with the criteria, a formula is presented that evaluates the reliable distribution based on the entered criteria, the base points necessary for the invariant method are selected when choosing the best path of action of the system participants with respect to the defined areas. When selecting the center points of the circles, the observation is determined according to the location density of the wells, to reduce the complexity of the selection of the base points and the reliable grouping problem, the reliable part is divided into sets, a knowledge base is formed, and the values of the knowledge base store the values considered to be highly effective.