scholarly journals Cryptographic Recursive Control of Integrity of Metadata Electronic Documents. Part 2. Complex of Algorithms

2020 ◽  
pp. 32-47
Author(s):  
Dmitry Tali ◽  
◽  
Oleg Finko ◽  
◽  
◽  
...  

The purpose of the study is to develop a set of algorithms to increase the level of security of metadata of electronic documents in conditions of destructive influences from authorized users (insiders). Research methods: the principle of chain data recording technology, methods of the theory of algorithms, theoretical provisions for the construction of automated information systems of legally significant electronic document management. The result of the research: a complex of algorithms for cryptographic recursive 2-D control of the integrity of metadata of electronic documents has been developed. Its feature is the following features: 1. localization of modified (with signs of integrity violation) metadata records of electronic documents; 2. identification of authorized users (insiders) who have carried out unauthorized modifications to the metadata of electronic documents; 3. identification of the fact of collusion of trusted parties through the introduction of mutual control of the results of their actions. The proposed solution allows to implement the functions of cryptographic recursive two-dimensional control of the integrity of metadata of electronic documents. At the same time, the use of the technology of chain data recording, at the heart of the presented solution, is due to the peculiarities of the functioning of departmental automated information systems of electronic document management.

2020 ◽  
pp. 2-18
Author(s):  
Dmitry Tali ◽  
◽  
Oleg Finko ◽  
◽  

The purpose of the research is to increase the level of security of electronic document metadata in the face of destructive influences from authorized users (insiders). Research methods: new scientific results allowed using a combination of data integrity control method based on the «write once» method and of authentication of HMAС messages (hash-based message authentication, as well as graph theory methods. Research result: a method of cryptographic recursive 2-D control of the integrity of electronic documents metadata is proposed. The analysis of the object of the study was carried out, based on the results of which it was concluded that it is necessary to effectively protect the metadata of electronic documents processed by automated information systems of electronic document management. Developed and described a mathematical model of the proposed method, based on graph theory. The developed technical solution makes it possible to implement the functions of cryptographic recursive twodimensional control of the integrity of the metadata of electronic documents, as well as to provide the possibility of localizing modified (with signs of violation of integrity) metadata records, in conditions of destructive influences of authorized users (insiders). This, in turn, reduces the likelihood of collusion between trusted parties by introducing mutual control over the results of their actions. The proposed solution makes it possible to ensure control of the integrity of data processed by departmental automated information systems of electronic document management, where, due to the peculiarities of their construction, it is impossible to effectively use the currently popular blockchain technology.


Author(s):  
A. R. Akhatov ◽  
F. M. Nazarov

The problem of application design by restriction and delay in ED (Electronic Document) management based on blockchain technologies to ensure a new level of security, reliability, transparency of data processing is considered. Increasing the reliability of information in systems by limiting and delaying ED management of enterprises and organizations during collecting, transmitting, storing and processing ED based on new, little-studied optimization technologies for processing blockchain-type data is a relevant and promising research topic. Important advantages of the potential use of transaction blocks built according to certain rules in systems by limiting and delaying ED are ensuring security by encrypting transactions for subsequent confirmation, the inability to make unauthorized changes due to the dependence of the current blockchain state on previous transactions, transparency and reliability of procedures due to public and distributed storage, as well as the interaction of a large number of users between without the use of “trusted intermediaries”. Studies show that when using existing algorithms for adding blocks in any system, it is possible to achieve the requirements of decentralization, openness of the entered data, the inability to change the data once entered into the system. However, mathematics-cryptographic information protection must be developed for each designed system separately. The task of providing and formulating the rules of data reliability control by limiting and delaying in ED circulation based on cryptographic methods of encrypting transaction blocks constituting the blockchain has been formulated. The approaches have been adopted as a methodology of support for systems by limiting and delaying electronic documents based on a new database architecture.


2014 ◽  
Vol 66 (2) ◽  
pp. 134-155 ◽  
Author(s):  
Matthew Jervis ◽  
Masood Masoodian

Purpose – This article aims to describe how people manage to integrate their use of paper and electronic documents in modern office work environments. Design/methodology/approach – An observational interview type study of 14 participants from 11 offices in eight organizations was conducted. Recorded data were analysed using a thematic analysis method. This involved reading and annotation of interview transcripts, categorizing, linking and connecting, corroborating, and producing an account of the study. Findings – The findings of the study can be categorized into four groups: the roles paper and electronic documents serve in today's offices, the ways in which these documents are managed, the problems associated with their management, and the types of fragmentation that exist in terms of their management and how these are dealt with. Practical implications – The study has identified the need for better integrated management of paper and electronic documents in present-day offices. The findings of the study have then been used to propose a set of guidelines for the development of integrated paper and electronic document management systems. Originality/value – Although similar studies of offices have been conducted in the past, almost all of these studies are prior to the widespread use of mobile and network-based shared technologies in office environments. Furthermore, previous studies have generally failed to identify and propose guidelines for integration of paper and electronic document management systems.


2021 ◽  
pp. 4-10
Author(s):  
A. Mazin ◽  
I. Korolev ◽  
V. Nazintsev ◽  
A. Okrachkov ◽  
K. Us

In this article, the subject of research is the sub-process of controlling the assignment of requisites to the electronic document of the process of registration and preparation of completed electronic documents for transfer to archival storage in the electronic document management system. The aim of the research is to develop a method for automatic control of the assignment of details to a completed electronic document. In the course of the study, the requirements of regulatory legal acts of federal executive bodies in the field of office work and archiving were analyzed, in terms of the registration of electronic files and their preparation for transfer to archival storage, scientific publications covering the issues of automation of office work in electronic office systems. A functional model was built for the process of control of registration and preparation for the delivery of electronic files for archival storage using the IDEF 0 methodology in a model for performing the sub-process of assigning details to a completed electronic document of the process of controlling registration and preparation for the delivery of electronic documents using the theory of logic (predicate logic). A method has been developed for automatic control of the assignment of requisites to a completed electronic case, which can be used in the design of advanced electronic document management systems, as well as modernization of existing ones by creating software modules that implement the functions of automatic control of the registration of completed electronic cases. This method makes it possible to increase the efficiency of the process of preparing completed electronic files for transfer to archival storage.


Author(s):  
D. Zaharov ◽  
YEkatyerina Kashtanova

This article discusses the features of ensuring electronic storage of personnel documents in an organization. Basic terms have been defined, such as an automated system for maintaining an archive of electronic document management, access rights, and electronic business. The procedure for recording an electronic personnel document per storage unit has been laid out. The types of documents that can be stored in electronic form are indicated. The procedure for storing an electronic personnel document is considered in detail. The process of ensuring information security of personnel documentation, as well as the procedure for submitting electronic documents at the request of authorized organizations or the application of employees, is considered. The procedure for access of officials to electronic personnel documents is considered separately.


Author(s):  
Karen L. Corral ◽  
Ryan C. LaBrie ◽  
Robert D. St. Louis

A large portion of the knowledge of most organizations is contained in electronic documents. For users to get pertinent information from the accumulation of stored documents, they need effective document retrieval systems. Unfortunately, electronic document management has fallen into the same trap that electronic data processing fell into: simply automating what previously was done manually. Paper documents were stored in folders in drawers in file cabinets. Electronic documents are stored in folders in directories on disk drives.


2020 ◽  
Vol 12 (1) ◽  
pp. 293-318
Author(s):  
Ainur K. Kussainova ◽  
Duman O. Kussainov ◽  
Bolat S. Zhumagulov ◽  
Zhomart K. Simtikov ◽  
Baurzhan O. Zhangutin

Purpose ”“ The main purpose of the paper is to analyze the problems of legal regulation of relations in the field of electronic document management. Methodology/approach/design ”“ The paper employs methods of comparative law and analytical, which determine the possibility of integrating international standards for the regulation of electronic document flow. Findings ”“ Electronic document flow is becoming an integral part of the most diverse areas of economic activity of any enterprise. The document flow contains elements of the general law of regulation and reaffirms the necessity of following specific instructions. Its electronic form allows the information interchange between subjects of economical and legal activity. This defines the possibility of the formation of a separate branch of legal regulation in the document flow. The possibility of the structuring and correlation of an informational and another branch of the law for the aim of complex usage of an electronic document flow is viewed as a separate aspect. Practical implications ”“ Material of the article may be useful in matters of regulation of the legislative system of document management. Originality/value ”“ The novelty of the study is that the article examined in detail the mechanism of electronic document management in different countries.


2021 ◽  
pp. 57-68
Author(s):  
Dmitry Tali ◽  
◽  
Oleg Finko ◽  
◽  
◽  
...  

The purpose of the study is to develop recommendations for organizing a cryptographic recursive 2-D control of the integrity of electronic documents metadata based on chain data recording technology. Research methods: the proposed methodology is based on the general principles of constructing a chain data record, which is a dynamic registry, where changes in metadata records are allowed without changing the previously entered information. In this case, the relationship between the metadata records is ensured through the use of a cryptographic hash function. Research result: the analysis of the life cycle of electronic documents processed by automated information systems of electronic document management was carried out, based on the results of which it was concluded that it is necessary to protect metadata by cryptographic methods in order to control their integrity and effectively manage electronic documents. The technique of cryptographic recursive 2-D control of the integrity of metadata of electronic documents, based on the previously proposed by the authors a mathematical model and a set of algorithms, has been developed. General and particular results of its application are described. The practical use of the proposed solutions makes it possible to provide the necessary measures to protect electronic documents in a time-changing environment, in accordance with the requirements for document management. This effect is achieved by bringing the existing metadata structure to the form of a multidimensional model, thereby making it possible to achieve the required level of their security


E-Management ◽  
2020 ◽  
Vol 3 (2) ◽  
pp. 55-62
Author(s):  
M. Oreshina ◽  
A. Badina

The regularities showing the development of information exchange in the virtual space have been examined, electronic document management in the organization using information systems has been considered. It has been shown that the intellectualization of information systems is based on a powerful mathematical apparatus that provides work with texts by computer programs, based on the creation of models that include patterns necessary for the design of modern information search systems, as well as systems for automatic classification and analysis of texts.A document flow model based on a number of mathematical regularities, numerical methods of multivariate integration, the theory of mixed Queuing networks has been proposed. This model allows you to evaluate the multivariate integration of devices of electronic document management systems (EDMS), contributes to the formation of statistical data on document processing, provides with minimal time costs the formation of information flows in electronic document management systems, has a convenient user interface for object interaction programs. This model, based on the definition of a set of options for data transmission channels, a set of options for data collection equipment EDMS, a set of options for data processing equipment, a set of end devices of the EDMS communication environment, allows you to analyse the functionality of electronic document management systems.The proposed EDMS model shows that a number of functions of complex document management in an organization can be automated and optimized based on mathematical methods, which will reduce the time of document preparation, its routing and processing. Document management of the organization, using this EDMS, ensures optimization of information flows in the organization, contributes to the formation of important management decisions, taking into account all risk factors.


Sign in / Sign up

Export Citation Format

Share Document