scholarly journals Cryptographic Recursive Control of Integrity of Metadata Electronic Documents. Part 1. Mathematical Model

2020 ◽  
pp. 2-18
Author(s):  
Dmitry Tali ◽  
◽  
Oleg Finko ◽  
◽  

The purpose of the research is to increase the level of security of electronic document metadata in the face of destructive influences from authorized users (insiders). Research methods: new scientific results allowed using a combination of data integrity control method based on the «write once» method and of authentication of HMAС messages (hash-based message authentication, as well as graph theory methods. Research result: a method of cryptographic recursive 2-D control of the integrity of electronic documents metadata is proposed. The analysis of the object of the study was carried out, based on the results of which it was concluded that it is necessary to effectively protect the metadata of electronic documents processed by automated information systems of electronic document management. Developed and described a mathematical model of the proposed method, based on graph theory. The developed technical solution makes it possible to implement the functions of cryptographic recursive twodimensional control of the integrity of the metadata of electronic documents, as well as to provide the possibility of localizing modified (with signs of violation of integrity) metadata records, in conditions of destructive influences of authorized users (insiders). This, in turn, reduces the likelihood of collusion between trusted parties by introducing mutual control over the results of their actions. The proposed solution makes it possible to ensure control of the integrity of data processed by departmental automated information systems of electronic document management, where, due to the peculiarities of their construction, it is impossible to effectively use the currently popular blockchain technology.

2020 ◽  
pp. 32-47
Author(s):  
Dmitry Tali ◽  
◽  
Oleg Finko ◽  
◽  
◽  
...  

The purpose of the study is to develop a set of algorithms to increase the level of security of metadata of electronic documents in conditions of destructive influences from authorized users (insiders). Research methods: the principle of chain data recording technology, methods of the theory of algorithms, theoretical provisions for the construction of automated information systems of legally significant electronic document management. The result of the research: a complex of algorithms for cryptographic recursive 2-D control of the integrity of metadata of electronic documents has been developed. Its feature is the following features: 1. localization of modified (with signs of integrity violation) metadata records of electronic documents; 2. identification of authorized users (insiders) who have carried out unauthorized modifications to the metadata of electronic documents; 3. identification of the fact of collusion of trusted parties through the introduction of mutual control of the results of their actions. The proposed solution allows to implement the functions of cryptographic recursive two-dimensional control of the integrity of metadata of electronic documents. At the same time, the use of the technology of chain data recording, at the heart of the presented solution, is due to the peculiarities of the functioning of departmental automated information systems of electronic document management.


Author(s):  
A. R. Akhatov ◽  
F. M. Nazarov

The problem of application design by restriction and delay in ED (Electronic Document) management based on blockchain technologies to ensure a new level of security, reliability, transparency of data processing is considered. Increasing the reliability of information in systems by limiting and delaying ED management of enterprises and organizations during collecting, transmitting, storing and processing ED based on new, little-studied optimization technologies for processing blockchain-type data is a relevant and promising research topic. Important advantages of the potential use of transaction blocks built according to certain rules in systems by limiting and delaying ED are ensuring security by encrypting transactions for subsequent confirmation, the inability to make unauthorized changes due to the dependence of the current blockchain state on previous transactions, transparency and reliability of procedures due to public and distributed storage, as well as the interaction of a large number of users between without the use of “trusted intermediaries”. Studies show that when using existing algorithms for adding blocks in any system, it is possible to achieve the requirements of decentralization, openness of the entered data, the inability to change the data once entered into the system. However, mathematics-cryptographic information protection must be developed for each designed system separately. The task of providing and formulating the rules of data reliability control by limiting and delaying in ED circulation based on cryptographic methods of encrypting transaction blocks constituting the blockchain has been formulated. The approaches have been adopted as a methodology of support for systems by limiting and delaying electronic documents based on a new database architecture.


2014 ◽  
Vol 66 (2) ◽  
pp. 134-155 ◽  
Author(s):  
Matthew Jervis ◽  
Masood Masoodian

Purpose – This article aims to describe how people manage to integrate their use of paper and electronic documents in modern office work environments. Design/methodology/approach – An observational interview type study of 14 participants from 11 offices in eight organizations was conducted. Recorded data were analysed using a thematic analysis method. This involved reading and annotation of interview transcripts, categorizing, linking and connecting, corroborating, and producing an account of the study. Findings – The findings of the study can be categorized into four groups: the roles paper and electronic documents serve in today's offices, the ways in which these documents are managed, the problems associated with their management, and the types of fragmentation that exist in terms of their management and how these are dealt with. Practical implications – The study has identified the need for better integrated management of paper and electronic documents in present-day offices. The findings of the study have then been used to propose a set of guidelines for the development of integrated paper and electronic document management systems. Originality/value – Although similar studies of offices have been conducted in the past, almost all of these studies are prior to the widespread use of mobile and network-based shared technologies in office environments. Furthermore, previous studies have generally failed to identify and propose guidelines for integration of paper and electronic document management systems.


2018 ◽  
Vol 11 (6) ◽  
pp. 336 ◽  
Author(s):  
Artem Dmitrievich Obukhov ◽  
Mikhail Nikolaevich Krasnyansky ◽  
Denis Leonidovich Dedov ◽  
Sergey Viktorovich Karpushkin

2016 ◽  
pp. 3-8
Author(s):  
S. Bozhko ◽  
I. Shevchenko ◽  
O. Pecherytsia ◽  
A. Syngaivskyi

The previous paper considered the creation of the system for management of nuclear knowledge, workflow and electronic documents (hereinafter called the Knowledge Portal) in the field of safe nuclear energy use. It presented initial steps needed to make an informed decision on the feasibility of implementing the Knowledge Portal and proposed methodological approaches based on practical experience of the State Nuclear Regulatory Inspectorate of Ukraine and the SSTC NRS. Further pre-project activities of the state body, local authorities, enterprises, institutions and organizations irrespective of ownership (hereinafter called the Institution) involve the development and drawing attention to the package of analytical, technical and feasibility documents. In particular, it is recommended to take into account the results of analyzing world trends in the development of information technology, audit status information and telecommunication systems (hereinafter — ITS) of the Institution, detailed strategy for the development of ITS Institution (hereinafter — the Strategy), the concept of the Knowledge Portal (hereinafter - the Concept) and preliminary technical solution. The results of review and approval of the Concept and architecture solution by scientific and technical council of the Institution is the basis for the preparation of Terms of Reference (hereinafter — TOR) on the development of the Knowledge Portal, forming schedules for the procurement of hardware and software, works on the development and implementation of portal solutions and information security systems. These issues are the subject of this publication.


2021 ◽  
pp. 4-10
Author(s):  
A. Mazin ◽  
I. Korolev ◽  
V. Nazintsev ◽  
A. Okrachkov ◽  
K. Us

In this article, the subject of research is the sub-process of controlling the assignment of requisites to the electronic document of the process of registration and preparation of completed electronic documents for transfer to archival storage in the electronic document management system. The aim of the research is to develop a method for automatic control of the assignment of details to a completed electronic document. In the course of the study, the requirements of regulatory legal acts of federal executive bodies in the field of office work and archiving were analyzed, in terms of the registration of electronic files and their preparation for transfer to archival storage, scientific publications covering the issues of automation of office work in electronic office systems. A functional model was built for the process of control of registration and preparation for the delivery of electronic files for archival storage using the IDEF 0 methodology in a model for performing the sub-process of assigning details to a completed electronic document of the process of controlling registration and preparation for the delivery of electronic documents using the theory of logic (predicate logic). A method has been developed for automatic control of the assignment of requisites to a completed electronic case, which can be used in the design of advanced electronic document management systems, as well as modernization of existing ones by creating software modules that implement the functions of automatic control of the registration of completed electronic cases. This method makes it possible to increase the efficiency of the process of preparing completed electronic files for transfer to archival storage.


Author(s):  
D. Zaharov ◽  
YEkatyerina Kashtanova

This article discusses the features of ensuring electronic storage of personnel documents in an organization. Basic terms have been defined, such as an automated system for maintaining an archive of electronic document management, access rights, and electronic business. The procedure for recording an electronic personnel document per storage unit has been laid out. The types of documents that can be stored in electronic form are indicated. The procedure for storing an electronic personnel document is considered in detail. The process of ensuring information security of personnel documentation, as well as the procedure for submitting electronic documents at the request of authorized organizations or the application of employees, is considered. The procedure for access of officials to electronic personnel documents is considered separately.


Author(s):  
Karen L. Corral ◽  
Ryan C. LaBrie ◽  
Robert D. St. Louis

A large portion of the knowledge of most organizations is contained in electronic documents. For users to get pertinent information from the accumulation of stored documents, they need effective document retrieval systems. Unfortunately, electronic document management has fallen into the same trap that electronic data processing fell into: simply automating what previously was done manually. Paper documents were stored in folders in drawers in file cabinets. Electronic documents are stored in folders in directories on disk drives.


Sign in / Sign up

Export Citation Format

Share Document