scholarly journals Cryptographic Recursive Control of Integrity of Metadata Electronic Documents. Part 3. Application Methodology

2021 ◽  
pp. 57-68
Author(s):  
Dmitry Tali ◽  
◽  
Oleg Finko ◽  
◽  
◽  
...  

The purpose of the study is to develop recommendations for organizing a cryptographic recursive 2-D control of the integrity of electronic documents metadata based on chain data recording technology. Research methods: the proposed methodology is based on the general principles of constructing a chain data record, which is a dynamic registry, where changes in metadata records are allowed without changing the previously entered information. In this case, the relationship between the metadata records is ensured through the use of a cryptographic hash function. Research result: the analysis of the life cycle of electronic documents processed by automated information systems of electronic document management was carried out, based on the results of which it was concluded that it is necessary to protect metadata by cryptographic methods in order to control their integrity and effectively manage electronic documents. The technique of cryptographic recursive 2-D control of the integrity of metadata of electronic documents, based on the previously proposed by the authors a mathematical model and a set of algorithms, has been developed. General and particular results of its application are described. The practical use of the proposed solutions makes it possible to provide the necessary measures to protect electronic documents in a time-changing environment, in accordance with the requirements for document management. This effect is achieved by bringing the existing metadata structure to the form of a multidimensional model, thereby making it possible to achieve the required level of their security

2020 ◽  
pp. 2-18
Author(s):  
Dmitry Tali ◽  
◽  
Oleg Finko ◽  
◽  

The purpose of the research is to increase the level of security of electronic document metadata in the face of destructive influences from authorized users (insiders). Research methods: new scientific results allowed using a combination of data integrity control method based on the «write once» method and of authentication of HMAС messages (hash-based message authentication, as well as graph theory methods. Research result: a method of cryptographic recursive 2-D control of the integrity of electronic documents metadata is proposed. The analysis of the object of the study was carried out, based on the results of which it was concluded that it is necessary to effectively protect the metadata of electronic documents processed by automated information systems of electronic document management. Developed and described a mathematical model of the proposed method, based on graph theory. The developed technical solution makes it possible to implement the functions of cryptographic recursive twodimensional control of the integrity of the metadata of electronic documents, as well as to provide the possibility of localizing modified (with signs of violation of integrity) metadata records, in conditions of destructive influences of authorized users (insiders). This, in turn, reduces the likelihood of collusion between trusted parties by introducing mutual control over the results of their actions. The proposed solution makes it possible to ensure control of the integrity of data processed by departmental automated information systems of electronic document management, where, due to the peculiarities of their construction, it is impossible to effectively use the currently popular blockchain technology.


2021 ◽  
pp. 37-50
Author(s):  
Dmitry Tali ◽  
◽  
Oleg Finko ◽  
◽  
◽  
...  

The purpose of the study is to obtain a numerical assessment of the results of the application, previously presented by the authors, of the method of cryptographic recursive 2-D control of the integrity of the metadata of electronic documents. Research methods: logical-probabilistic method I.A. Ryabinin. Research result: a necessary condition for maintaining the integrity of electronic documents processed by automated information systems for electronic document management is to ensure the required level of metadata security. To evaluate the research results, the probability of violation of the integrity of electronic documents (through destructive influences of authorized users on metadata) was chosen as an indicator of efficiency. The presented approach to the construction of logical-probabilistic models for assessing the level of security of metadata of electronic documents allows in practice to obtain numerical values of the probabilities of transition of the systems under consideration to a dangerous state (associated with a violation of the integrity of the metadata of electronic documents), taking into account the structure of such systems and the real conditions of their functioning. The effect of using the developed method, under the conditions of destructive influences of authorized users (insiders), in comparison with the known solutions (using a hash function) of such problems, is 67% under the given assumptions.


2020 ◽  
pp. 32-47
Author(s):  
Dmitry Tali ◽  
◽  
Oleg Finko ◽  
◽  
◽  
...  

The purpose of the study is to develop a set of algorithms to increase the level of security of metadata of electronic documents in conditions of destructive influences from authorized users (insiders). Research methods: the principle of chain data recording technology, methods of the theory of algorithms, theoretical provisions for the construction of automated information systems of legally significant electronic document management. The result of the research: a complex of algorithms for cryptographic recursive 2-D control of the integrity of metadata of electronic documents has been developed. Its feature is the following features: 1. localization of modified (with signs of integrity violation) metadata records of electronic documents; 2. identification of authorized users (insiders) who have carried out unauthorized modifications to the metadata of electronic documents; 3. identification of the fact of collusion of trusted parties through the introduction of mutual control of the results of their actions. The proposed solution allows to implement the functions of cryptographic recursive two-dimensional control of the integrity of metadata of electronic documents. At the same time, the use of the technology of chain data recording, at the heart of the presented solution, is due to the peculiarities of the functioning of departmental automated information systems of electronic document management.


Author(s):  
A. R. Akhatov ◽  
F. M. Nazarov

The problem of application design by restriction and delay in ED (Electronic Document) management based on blockchain technologies to ensure a new level of security, reliability, transparency of data processing is considered. Increasing the reliability of information in systems by limiting and delaying ED management of enterprises and organizations during collecting, transmitting, storing and processing ED based on new, little-studied optimization technologies for processing blockchain-type data is a relevant and promising research topic. Important advantages of the potential use of transaction blocks built according to certain rules in systems by limiting and delaying ED are ensuring security by encrypting transactions for subsequent confirmation, the inability to make unauthorized changes due to the dependence of the current blockchain state on previous transactions, transparency and reliability of procedures due to public and distributed storage, as well as the interaction of a large number of users between without the use of “trusted intermediaries”. Studies show that when using existing algorithms for adding blocks in any system, it is possible to achieve the requirements of decentralization, openness of the entered data, the inability to change the data once entered into the system. However, mathematics-cryptographic information protection must be developed for each designed system separately. The task of providing and formulating the rules of data reliability control by limiting and delaying in ED circulation based on cryptographic methods of encrypting transaction blocks constituting the blockchain has been formulated. The approaches have been adopted as a methodology of support for systems by limiting and delaying electronic documents based on a new database architecture.


2014 ◽  
Vol 66 (2) ◽  
pp. 134-155 ◽  
Author(s):  
Matthew Jervis ◽  
Masood Masoodian

Purpose – This article aims to describe how people manage to integrate their use of paper and electronic documents in modern office work environments. Design/methodology/approach – An observational interview type study of 14 participants from 11 offices in eight organizations was conducted. Recorded data were analysed using a thematic analysis method. This involved reading and annotation of interview transcripts, categorizing, linking and connecting, corroborating, and producing an account of the study. Findings – The findings of the study can be categorized into four groups: the roles paper and electronic documents serve in today's offices, the ways in which these documents are managed, the problems associated with their management, and the types of fragmentation that exist in terms of their management and how these are dealt with. Practical implications – The study has identified the need for better integrated management of paper and electronic documents in present-day offices. The findings of the study have then been used to propose a set of guidelines for the development of integrated paper and electronic document management systems. Originality/value – Although similar studies of offices have been conducted in the past, almost all of these studies are prior to the widespread use of mobile and network-based shared technologies in office environments. Furthermore, previous studies have generally failed to identify and propose guidelines for integration of paper and electronic document management systems.


2016 ◽  
pp. 3-8
Author(s):  
S. Bozhko ◽  
I. Shevchenko ◽  
O. Pecherytsia ◽  
A. Syngaivskyi

The previous paper considered the creation of the system for management of nuclear knowledge, workflow and electronic documents (hereinafter called the Knowledge Portal) in the field of safe nuclear energy use. It presented initial steps needed to make an informed decision on the feasibility of implementing the Knowledge Portal and proposed methodological approaches based on practical experience of the State Nuclear Regulatory Inspectorate of Ukraine and the SSTC NRS. Further pre-project activities of the state body, local authorities, enterprises, institutions and organizations irrespective of ownership (hereinafter called the Institution) involve the development and drawing attention to the package of analytical, technical and feasibility documents. In particular, it is recommended to take into account the results of analyzing world trends in the development of information technology, audit status information and telecommunication systems (hereinafter — ITS) of the Institution, detailed strategy for the development of ITS Institution (hereinafter — the Strategy), the concept of the Knowledge Portal (hereinafter - the Concept) and preliminary technical solution. The results of review and approval of the Concept and architecture solution by scientific and technical council of the Institution is the basis for the preparation of Terms of Reference (hereinafter — TOR) on the development of the Knowledge Portal, forming schedules for the procurement of hardware and software, works on the development and implementation of portal solutions and information security systems. These issues are the subject of this publication.


2021 ◽  

Abstract. The article deals with the concept of "electronic justice" and features of the use of electronic justice for the consideration of economic disputes. In the digital economy e-justice is one of the legal constructions that provide a comfortable legal environment for economic activity. This is a complex of legal relations and technological solutions that provides individuals and legal entities with the opportunity to use digital technologies at all stages of the judicial process, to obtain information about the activities of courts through electronic access. The e-justice mechanism includes video and audio recording of court sessions, electronic document management with the use of an electronic signature, an electronic archive for storing electronic documents, the use of cloud technologies, as well as the use of electronic documents as evidence. Improving the legal regulation of e-justice in the digital economy, along with reforming procedural legislation, should include the development of a Federal law on electronic documents.


2021 ◽  
pp. 4-10
Author(s):  
A. Mazin ◽  
I. Korolev ◽  
V. Nazintsev ◽  
A. Okrachkov ◽  
K. Us

In this article, the subject of research is the sub-process of controlling the assignment of requisites to the electronic document of the process of registration and preparation of completed electronic documents for transfer to archival storage in the electronic document management system. The aim of the research is to develop a method for automatic control of the assignment of details to a completed electronic document. In the course of the study, the requirements of regulatory legal acts of federal executive bodies in the field of office work and archiving were analyzed, in terms of the registration of electronic files and their preparation for transfer to archival storage, scientific publications covering the issues of automation of office work in electronic office systems. A functional model was built for the process of control of registration and preparation for the delivery of electronic files for archival storage using the IDEF 0 methodology in a model for performing the sub-process of assigning details to a completed electronic document of the process of controlling registration and preparation for the delivery of electronic documents using the theory of logic (predicate logic). A method has been developed for automatic control of the assignment of requisites to a completed electronic case, which can be used in the design of advanced electronic document management systems, as well as modernization of existing ones by creating software modules that implement the functions of automatic control of the registration of completed electronic cases. This method makes it possible to increase the efficiency of the process of preparing completed electronic files for transfer to archival storage.


Author(s):  
D. Zaharov ◽  
YEkatyerina Kashtanova

This article discusses the features of ensuring electronic storage of personnel documents in an organization. Basic terms have been defined, such as an automated system for maintaining an archive of electronic document management, access rights, and electronic business. The procedure for recording an electronic personnel document per storage unit has been laid out. The types of documents that can be stored in electronic form are indicated. The procedure for storing an electronic personnel document is considered in detail. The process of ensuring information security of personnel documentation, as well as the procedure for submitting electronic documents at the request of authorized organizations or the application of employees, is considered. The procedure for access of officials to electronic personnel documents is considered separately.


Author(s):  
Karen L. Corral ◽  
Ryan C. LaBrie ◽  
Robert D. St. Louis

A large portion of the knowledge of most organizations is contained in electronic documents. For users to get pertinent information from the accumulation of stored documents, they need effective document retrieval systems. Unfortunately, electronic document management has fallen into the same trap that electronic data processing fell into: simply automating what previously was done manually. Paper documents were stored in folders in drawers in file cabinets. Electronic documents are stored in folders in directories on disk drives.


Sign in / Sign up

Export Citation Format

Share Document