Methods of process adaptation of users access security to social systems

Author(s) Collection number Pages Download abstract Download full text
Durniak B. V., Khometa T. M. № 1 (71) 30-38 Image Image

In this article the methods of adaptation of the access system to the user have been examined and developed, which can appear to be not prepared enough to work with the system in a necessary measure. Therefore the adaptation consists in the access activation of the dialog with a user by the system. The dialog is formed thus, that a user can get additional information about the methods of connection with the system. Due to such adaptation the system becomes friendlier for an ordinary user.

Keywords: adaptation, system of access security (SZD), system of facilities of security (SZZ), heterogeneity of users, one-way process, diagnostic dialog, measure of preparation, modification, semantics.


  • 1. Miksi, M., & Polino, D. (2004). Bezopasnost bez provodnyh setei. Moscow: Company IT, DMK Press (in Russian).
  • 2. Rusev, D. (2003).Tekhnologiya bezprovodnogo dostupa. Spravochnik. SPB: BHV — Petersburg (in Russian).
  • 3. Irvin J., & Kharl D. (2003). Peredacha danykh v setyah: inghenernyi podkhod. SPB: BHV — S. Petersburg (in Russian).
  • 4. Meshcheryakov, E., &Khomonenko, A. (2003). Publikaciya baz dannykh v internete. SPB: BHV — S. Petersburg (in Russian).
  • 5. Rash, M., Orebauch, A., Clark, G., Pinkard, B., & Bablin,. J. (2007). Zapobeganiye i aktyvne prshecivdelaniye intruzom. Warchwa: PWN (in Polish).