Research Article
Automatic Control Model of Power Information System Access Based on Artificial Intelligence Technology
Table 3
Access control security testing.
| Model | Number of illegal users logged in successfully/person | Number of illegal users/person who can modify information | Number of unreachable legitimate users/people | Number of legitimate users/people who cannot modify information |
| PKI model | 8 | 6 | 17 | 9 | IBE model | 6 | 8 | 10 | 7 | Model | 0 | 0 | 0 | 1 |
|
|