The model that brings the data input/output under control in closed network systems, that maintains the system securely,
and that controls the flow of information through the Main Control Computer which also brings the network traffic under
control against cyber-attacks. The network, which can be controlled single-handedly thanks to the system designed to
enable the network users to make data entry into the system or to extract data from the system securely, intends to
minimize the security gaps. Moreover, data input/output record can be kept by means of the user account assigned for
each user, and it is also possible to carry out retroactive tracking, if requested. Because the measures that need to be
taken for each computer on the network regarding cyber security, do require high cost; it has been intended to provide a
cost-effective working environment with this model, only if the Main Control Computer has the updated hardware.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.