METHODS OF IMPLEMENTATION OF BLOCKCHAIN TECHNOLOGIES ON THE BASIS OF CRYPTOGRAPHIC PROTECTION FOR THE DATA PROCESSING SYSTEM WITH CONSTRAINT AND LAGGING INTO ELECTRONIC DOCUMENT MANAGEMEN

Author(s):  
A. R. Akhatov ◽  
F. M. Nazarov

The problem of application design by restriction and delay in ED (Electronic Document) management based on blockchain technologies to ensure a new level of security, reliability, transparency of data processing is considered. Increasing the reliability of information in systems by limiting and delaying ED management of enterprises and organizations during collecting, transmitting, storing and processing ED based on new, little-studied optimization technologies for processing blockchain-type data is a relevant and promising research topic. Important advantages of the potential use of transaction blocks built according to certain rules in systems by limiting and delaying ED are ensuring security by encrypting transactions for subsequent confirmation, the inability to make unauthorized changes due to the dependence of the current blockchain state on previous transactions, transparency and reliability of procedures due to public and distributed storage, as well as the interaction of a large number of users between without the use of “trusted intermediaries”. Studies show that when using existing algorithms for adding blocks in any system, it is possible to achieve the requirements of decentralization, openness of the entered data, the inability to change the data once entered into the system. However, mathematics-cryptographic information protection must be developed for each designed system separately. The task of providing and formulating the rules of data reliability control by limiting and delaying in ED circulation based on cryptographic methods of encrypting transaction blocks constituting the blockchain has been formulated. The approaches have been adopted as a methodology of support for systems by limiting and delaying electronic documents based on a new database architecture.

Author(s):  
Karen L. Corral ◽  
Ryan C. LaBrie ◽  
Robert D. St. Louis

A large portion of the knowledge of most organizations is contained in electronic documents. For users to get pertinent information from the accumulation of stored documents, they need effective document retrieval systems. Unfortunately, electronic document management has fallen into the same trap that electronic data processing fell into: simply automating what previously was done manually. Paper documents were stored in folders in drawers in file cabinets. Electronic documents are stored in folders in directories on disk drives.


2011 ◽  
pp. 1464-1472
Author(s):  
Karen L. Corral ◽  
Ryan C. LaBrie ◽  
Robert D. St.Louis

A large portion of the knowledge of most organizations is contained in electronic documents. For users to get pertinent information from the accumulation of stored documents, they need effective document retrieval systems. Unfortunately, electronic document management has fallen into the same trap that electronic data processing fell into: simply automating what previously was done manually. Paper documents were stored in folders in drawers in file cabinets. Electronic documents are stored in folders in directories on disk drives.


Author(s):  
Karen L. Corral ◽  
Ryan C. LaBrie ◽  
Robert D. St. Louis

A large portion of the knowledge of most organizations is contained in electronic documents. For users to get pertinent information from the accumulation of stored documents, they need effective document retrieval systems. Unfortunately, electronic document management has fallen into the same trap that electronic data processing fell into: simply automating what previously was done manually. Paper documents were stored in folders in drawers in file cabinets. Electronic documents are stored in folders in directories on disk drives.


2020 ◽  
pp. 2-18
Author(s):  
Dmitry Tali ◽  
◽  
Oleg Finko ◽  
◽  

The purpose of the research is to increase the level of security of electronic document metadata in the face of destructive influences from authorized users (insiders). Research methods: new scientific results allowed using a combination of data integrity control method based on the «write once» method and of authentication of HMAС messages (hash-based message authentication, as well as graph theory methods. Research result: a method of cryptographic recursive 2-D control of the integrity of electronic documents metadata is proposed. The analysis of the object of the study was carried out, based on the results of which it was concluded that it is necessary to effectively protect the metadata of electronic documents processed by automated information systems of electronic document management. Developed and described a mathematical model of the proposed method, based on graph theory. The developed technical solution makes it possible to implement the functions of cryptographic recursive twodimensional control of the integrity of the metadata of electronic documents, as well as to provide the possibility of localizing modified (with signs of violation of integrity) metadata records, in conditions of destructive influences of authorized users (insiders). This, in turn, reduces the likelihood of collusion between trusted parties by introducing mutual control over the results of their actions. The proposed solution makes it possible to ensure control of the integrity of data processed by departmental automated information systems of electronic document management, where, due to the peculiarities of their construction, it is impossible to effectively use the currently popular blockchain technology.


2014 ◽  
Vol 66 (2) ◽  
pp. 134-155 ◽  
Author(s):  
Matthew Jervis ◽  
Masood Masoodian

Purpose – This article aims to describe how people manage to integrate their use of paper and electronic documents in modern office work environments. Design/methodology/approach – An observational interview type study of 14 participants from 11 offices in eight organizations was conducted. Recorded data were analysed using a thematic analysis method. This involved reading and annotation of interview transcripts, categorizing, linking and connecting, corroborating, and producing an account of the study. Findings – The findings of the study can be categorized into four groups: the roles paper and electronic documents serve in today's offices, the ways in which these documents are managed, the problems associated with their management, and the types of fragmentation that exist in terms of their management and how these are dealt with. Practical implications – The study has identified the need for better integrated management of paper and electronic documents in present-day offices. The findings of the study have then been used to propose a set of guidelines for the development of integrated paper and electronic document management systems. Originality/value – Although similar studies of offices have been conducted in the past, almost all of these studies are prior to the widespread use of mobile and network-based shared technologies in office environments. Furthermore, previous studies have generally failed to identify and propose guidelines for integration of paper and electronic document management systems.


2021 ◽  
pp. 4-10
Author(s):  
A. Mazin ◽  
I. Korolev ◽  
V. Nazintsev ◽  
A. Okrachkov ◽  
K. Us

In this article, the subject of research is the sub-process of controlling the assignment of requisites to the electronic document of the process of registration and preparation of completed electronic documents for transfer to archival storage in the electronic document management system. The aim of the research is to develop a method for automatic control of the assignment of details to a completed electronic document. In the course of the study, the requirements of regulatory legal acts of federal executive bodies in the field of office work and archiving were analyzed, in terms of the registration of electronic files and their preparation for transfer to archival storage, scientific publications covering the issues of automation of office work in electronic office systems. A functional model was built for the process of control of registration and preparation for the delivery of electronic files for archival storage using the IDEF 0 methodology in a model for performing the sub-process of assigning details to a completed electronic document of the process of controlling registration and preparation for the delivery of electronic documents using the theory of logic (predicate logic). A method has been developed for automatic control of the assignment of requisites to a completed electronic case, which can be used in the design of advanced electronic document management systems, as well as modernization of existing ones by creating software modules that implement the functions of automatic control of the registration of completed electronic cases. This method makes it possible to increase the efficiency of the process of preparing completed electronic files for transfer to archival storage.


Author(s):  
D. Zaharov ◽  
YEkatyerina Kashtanova

This article discusses the features of ensuring electronic storage of personnel documents in an organization. Basic terms have been defined, such as an automated system for maintaining an archive of electronic document management, access rights, and electronic business. The procedure for recording an electronic personnel document per storage unit has been laid out. The types of documents that can be stored in electronic form are indicated. The procedure for storing an electronic personnel document is considered in detail. The process of ensuring information security of personnel documentation, as well as the procedure for submitting electronic documents at the request of authorized organizations or the application of employees, is considered. The procedure for access of officials to electronic personnel documents is considered separately.


2020 ◽  
Vol 12 (1) ◽  
pp. 293-318
Author(s):  
Ainur K. Kussainova ◽  
Duman O. Kussainov ◽  
Bolat S. Zhumagulov ◽  
Zhomart K. Simtikov ◽  
Baurzhan O. Zhangutin

Purpose ”“ The main purpose of the paper is to analyze the problems of legal regulation of relations in the field of electronic document management. Methodology/approach/design ”“ The paper employs methods of comparative law and analytical, which determine the possibility of integrating international standards for the regulation of electronic document flow. Findings ”“ Electronic document flow is becoming an integral part of the most diverse areas of economic activity of any enterprise. The document flow contains elements of the general law of regulation and reaffirms the necessity of following specific instructions. Its electronic form allows the information interchange between subjects of economical and legal activity. This defines the possibility of the formation of a separate branch of legal regulation in the document flow. The possibility of the structuring and correlation of an informational and another branch of the law for the aim of complex usage of an electronic document flow is viewed as a separate aspect. Practical implications ”“ Material of the article may be useful in matters of regulation of the legislative system of document management. Originality/value ”“ The novelty of the study is that the article examined in detail the mechanism of electronic document management in different countries.


2019 ◽  
Vol 18 (6) ◽  
pp. 1269-1300
Author(s):  
Yuri Yazov ◽  
Oleg Avsentev ◽  
Alexander Avsentev ◽  
Irina Rubtsova

Traditional approaches to assessing the effectiveness of information security, based on a comparison of the possibilities of realizing threats to information security in absence and application of protection measures, do not allow to analyze the dynamics of suppression by security measures of the process of implementing threats. The paper proposes a new indicator of the effectiveness of protection of electronic documents, aimed at assessing the possibility of advancing security measures of the process of implementing threats in electronic document management systems using the probability-time characteristics of the dynamics of the application of protection measures and the implementation of threats to electronic documents. Mathematical models were developed using the Petri-Markov network apparatus and analytical relationships were obtained for calculating the proposed indicator using the example of the "traffic tunneling" threat (placing intruder packets in trusted user packets) and unauthorized access (network attacks) to electronic documents, as well as the threat of intrusion of malicious program by carrying out an "blind IP spoofing" attack (network address spoofing). Examples of calculating the proposed indicator and graphs of its dependence on the probability of detecting network attacks by the intrusion detection system and on the probability of malware detection by the anti-virus protection system are given. Quantitative dependencies are obtained for the effectiveness of protection of electronic documents due to being ahead of protection measures for threat realization processes, both on the probability of detecting an intrusion or the probability of detecting a malicious program, and on the ratio of the time spent by the protection system on detecting an attempt to implement a threat and taking measures to curb its implementation, and threat implementation time. Models allow not only to evaluate the effectiveness of measures to protect electronic documents from threats of destruction, copying, unauthorized changes, etc., but also to quantify the requirements for the response time of adaptive security systems to detectable actions aimed at violating the security of electronic documents, depending on the probability -temporal characteristics of threat realization processes, to identify weaknesses in protection systems related to the dynamics of threat realization and the reaction of defense systems to such threats electronic document.


Sign in / Sign up

Export Citation Format

Share Document