Перегляд за автором "Kuzminykh, I."
Зараз показано 1 - 3 з 3
Результатів на сторінку
Варіанти сортування
Публікація Cybersecurity Virtual Laboratory for distance learning(ACM, 2020) Yeremenko, O.; Yevdokymenko, M.; Kuzminykh, I.; Kruhlova, A.In the conditions of distance learning of university students, there is a problem of practical and laboratory work organization. This is especially true of technical universities, where training in ordinary conditions is carried out on real equipment and using specialized software. In this regard, there is an urgent need to create a virtual laboratory, as an effective platform for distance learning students.Публікація Development of Smart Infocommunication Networks for Intellectual Municipal Services(KHARKIV NATIONAL UNIVERSITY OF RADIO ELECTRONICS, 2015) Kuzminykh, I.; Kabali, S.This paper represents the smart system that bypasses the normal functioning algorithm of traffic lights, triggers a green light when the lights are red or to reset the timer of the traffic lights when they are about to turn red. Different pieces of hardware like microcontroller units, transceivers, resistors, diode, LEDs, digital compass and accelerometer will be coupled together and programmed to create a unified complex intelligent systemПублікація Mechanisms of ensuring security in Keystone service(ХНУРЕ, 2019) Kuzminykh, I.; Fliustikova, M.User authentication is one of the most important aspects in the area of cloud services, followed by the storing of sensitive information about customers. A number of solutions exist for authentication, security, and privacy provisioning in cloud, while cloud identity management systems aim to simplify and harmonise access. This paper presents an investigation into the security problems associated with cloud identity and access management system (IAMS), using the Keystone identity service within OpenStack as an example. In order to analyse the existing challenges, the paper expands security provisioning into authentication management, authorization management, personal data protection, privacy and confidentiality, as well as logging and auditing and considers the security mechanisms required for any cloud IAMS for each one of these categories. The paper also investigates some of the existing and potential attacks against the Keystone service, then follows with recommendations and mechanisms for enhancing the security. The vulnerabilities in cloud IAMS show that most systems support at most a subset of security provisioning mechanisms or have their own flaws; in addition, there are no unified international standards in this cloud identity systems area for cloud and service providers. The identified list of attacks and the associated mitigation mechanisms will help to provide the identity and access management system with the protection of identity credentials in the cloud system. The provided results can help with further researching mechanisms aiming to ensure personal data confidentiality and integrity.