ARTÍCULO
TITULO

Architecture of a computing complex for web services and portals with multilevel access control over public networks

Shamil Magomedov    

Resumen

The article is devoted to the development of the architecture of computing systems with multilevel access control to web services over public networks. Information technologies are becoming global and cross-border which leads them to become an integral part of all spheres of activity of an individual, society and state. Their effective application is a factor in accelerating the economic development of the state and the formation of an information society. At the same time, the rapid scientific and technological progress and the constant improvement of software and hardware require, on the one hand, the same constant improvement and increase in the efficiency of the functioning of all components, in terms of reducing costs, improving quality, reliability, safety, but at the same time providing a high level security of access to computing resources, without violating the requirements of existing laws to protect personal and confidential data. Taking into account the ever-increasing requirements for information infrastructure, the development of a computing complex architecture with various access control mechanisms that can expand the capabilities of information security tools is a very urgent task. Despite the fact that modern systems have a wide range of mechanisms and means of protecting information, they are clearly not enough, taking into account constant hacks and information leaks, therefore it is necessary to determine their role and place in each level of computing architecture. The paper proposes the architecture of a data processing system of a computing complex, with the described components serving to ensure access control. Also presented are the levels of data access when components access the computing complex, with a detailed description of the functioning and filling of modules. The results of experimental studies for assessing resource costs when tracking all the user actions are presented.

 Artículos similares

       
 
Peranut Nimitsurachat and Peter Washington    
Emotion recognition models using audio input data can enable the development of interactive systems with applications in mental healthcare, marketing, gaming, and social media analysis. While the field of affective computing using audio data is rich, a m... ver más
Revista: AI

 
Saeed Musaad Altalhi, Fathy Elbouraey Eassa, Abdullah Saad Al-Malaise Al-Ghamdi, Sanaa Abdullah Sharaf, Ahmed Mohammed Alghamdi, Khalid Ali Almarhabi and Maher Ali Khemakhem    
As the development of high-performance computing (HPC) is growing, exascale computing is on the horizon. Therefore, it is imperative to develop parallel systems, such as graphics processing units (GPUs) and programming models, that can effectively utilis... ver más
Revista: Applied Sciences

 
Guillaume Devic, Gilles Sassatelli and Abdoulaye Gamatié    
The execution of machine learning (ML) algorithms on resource-constrained embedded systems is very challenging in edge computing. To address this issue, ML accelerators are among the most efficient solutions. They are the result of aggressive architectur... ver más

 
Xiaoxu Dong, Xin Wang, Ling Peng, Miao Wang and Guoqing Wang    
Avionics Cloud is a new multi-platform avionics system architecture that provides dynamic access, resource pooling, intelligent scheduling, on-demand service and other cloud computing features. Using Avionics Cloud to rationalize the order of multi-fligh... ver más
Revista: Aerospace

 
Kyungwoon Lee, Jeongsu Kim, Ik-Hyeon Kwon, Hyunchan Park and Cheol-Ho Hong    
Containers enable high performance and easy deployment due to their lightweight architecture, thus facilitating resource utilization in edge computing nodes. Secure container runtimes have attracted significant attention because of the necessity for over... ver más
Revista: Applied Sciences