An analysis and comparative researches of technologies of differentiating of access for defence of information is conducted in the computer systems. Classification of base technologies of differentiating of access is developed to the resources of the computer systems. Found out the row of characteristic features, advantages and lacks of existent directions and technologies of access control. Certainly, that one of the most perspective directions of design of process of differentiating of access are the subject-oriented technologies of the isolated software environment.
protection of data, differentiating of access, computer systems, mathematical design