@article{MAKHILLAJIT201615136226, title = {Analysis of Possibilities for Application of Authentication and Authorization Protocols for Building of Safety Infrastructure for Distributed Information and Computing Environment}, journal = {Asian Journal of Information Technology}, volume = {15}, number = {13}, pages = {2244-2247}, year = {2016}, issn = {1682-3915}, doi = {ajit.2016.2244.2247}, url = {https://makhillpublications.co/view-article.php?issn=1682-3915&doi=ajit.2016.2244.2247}, author = {Sergej A.,Igor S.,Oleg V.,Vladimir E. and}, keywords = {Distributed information and computing resources,virtual secure environment,information access control,protocol analysis,authentication,authorization,information exchange,network of portals}, abstract = {This study provides an analytical overview of the advantages and disadvantages of the protocols that can be used upon building of security infrastructure for distributed information and computing environment. To build such an environment based on a distributed network of portals with a heterogeneous structure, we have considered open protocols applied in implementation of various aspects of secure information exchange.} }