The dissertation work solves and investigates the scientific and technical problem, which consists in solving the contradiction between the need for high-performance processing of information resources with limited access, the parallel processing of which puts forward high requirements for the speed of their preparation and single-threaded mechanisms for differentiation of access cannot provide them, so it is proposed to develop methods and models that can coordinate the performance of processing and protection methods and adapt them to each other for high-performance and safe existence in distributed information , which allows to obtain new solutions for scientific and technical problems of the formation of a system of differentiation of access to information resources of a person, society and the state on the basis of the use of protection models, which by means of prompt adjustment of the process of control of access separation, including on the basis of neural networks, allowed to give the appropriate subsystem of protection properties of adaptation in relation to the criteria determined by the parameters of the system security level and parameters that characterize the processes of information processing in specialized distributed information systems.
An important problem that needs to be solved when designing protections for the access system is the implementation of such protections that could independently adapt to certain changes that occur at the needs of users of the relevant system. In this case, there are problems of recognition of authorized or legal users, the task of adapting the parameters of the means of protection and the protection system as a whole to external changes that occur in users. From the above it follows that the means of protection, which are inherent in the above properties, should be built on the basis of a theoretical apparatus and such tools that would ensure the implementation of the necessary algorithms for solving these problems to the maximum extent possible. One of these tools, which could to the greatest extent provide the possibility of solving these problems, are neural networks.
The dissertation is devoted to the issues of creating a method for the functioning of information security systems, which implements the settings of the means of protecting the system of access to information resources to the current degree of danger based on the use of parameters of the information processing process, which made it possible to reduce the loss of time by coordinating information processing processes and providing access to it. An extended mathematical model of an element of a neural network for solving adaptation problems has been developed, the expediency of its use has been substantiated, investigated that allow adjusting the parameters of a neural network that controls the access system adequately to the real position of objects, the problems that arise in this case, and ways to overcome them are highlighted. Methods of organizing data control, which are used for identification in access systems, have been investigated. Methods of self-organization of access means have been developed, which made it possible to automate the modification of the elements of the protection system during the implementation of the adaptation process. Basic information components are proposed that expand the security means of the access system, due to which it became possible to coordinate the speed of information processing and provision of access to it by setting the appropriate parameters, which made it possible to expand the subject area by adapting access control. A method for the functioning of the information security system is proposed, in which the system is able to quickly adapt to real-life threats and attacks, changing the level of security, and accordingly changing the number of resources used for its implementation, which directly determines the cost of functioning of the security system. On the basis of theoretical research, security tools for identification by keyboard handwriting with adaptation to its changes have been implemented. Methods for the general organization of the use of the proposed technology in the design of specific adaptive systems for protecting access to information resources have been developed and tested.
Keywords: access control, information security, distributed information systems, identification, authentication, authorization.