scholarly journals The Method for creating a trusted hardware-software platform for its application in special purpose information systems

2021 ◽  
Vol 28 (4) ◽  
pp. 104-117
Author(s):  
Alexey Y. Borovikov ◽  
Oleg A. Maslov ◽  
Stepan A. Mordvinov ◽  
Andrey A. Esafiev
2021 ◽  
Vol 1 ◽  
pp. 100-110
Author(s):  
Andrei A. Basargin ◽  
Viktor S. Pisarev

Modern trends in the development of information support for mining technology dictate the need for a comprehensive solution of technological problems on the basis of a single software platform, which provides the ability to quickly adapt the basic functionality and develop a new one to the conditions of a mining enterprise. In this case, the ideology of building and developing information systems is of key importance. The modeling technique proposed by the authors is suitable for solving the current problems of the geological service of mining enterprises. At the same time, such software and tools have been developed as the allocation of ore standard and grade intervals, multi-criteria sampling of sampling data for assessing the reserves of useful components for the field as a whole and in mining units, as well as interactive input of geophysical sampling for underground mining. The developed software in GGIS Micromine is being tested at mining enterprises in Russia and is being improved to better meet the needs of geological services.


1994 ◽  
Vol 03 (01) ◽  
pp. 3-23 ◽  
Author(s):  
SILVANO POZZI ◽  
LUCA GIACHINO

This paper illustrates an object-oriented programming environment, called Application Conference Interface (ACI), which has been designed in order to facilitate the implementation of cooperative information systems. It interfaces developers of cooperative applications with services provided by a software platform, called ImagineDesk. The platform offers a rich set of services which can be exploited by developers of cooperative applications in order to manage them, to exchange multimedia data and to control users' interactions according to their roles. Basically, the ACI provides a set of local abstractions of remote services. These abstractions take the form of local objects, hiding the details of the underlying physical network from the application developer. By exploiting the object-oriented paradigm, the ACI clearly confines the host environment and network constraints in few easily upgradable objects, thus resulting in a highly system-independent architecture.


2021 ◽  
Vol 2094 (3) ◽  
pp. 032018
Author(s):  
S V Mishina ◽  
D V Kornienko

Abstract The developers of 1C offer a line of software products to automate the production processes of enterprises. 1C: ERP Enterprise Management and 1C: Salary and Personnel Management are the flagship solutions of 1C. In the course of the work, the difficulties that arise when it is necessary to synchronize data between the configurations of 1C: ERP Enterprise Management and 1C: Salary and Personnel Management have been analyzed. This article analyzes the functionality of the above products. An overview of the main elements underlying the mechanism for synchronizing information between 1C applied solutions is given. The process of data exchange and synchronization between the products 1C: ERP Enterprise Management and 1C: Salary and Personnel Management using the built-in tools of the 1C software platform is considered. The process of organizing interaction and data synchronization in the considered solutions is presented. Recommendations related to setting up and receiving synchronized objects are given. The analysis of the results is carried out, conclusions are drawn.


2021 ◽  
pp. 68-77
Author(s):  
Aleksey Borovikov ◽  
◽  
Oleg Maslov ◽  
Stepan Mordvinov ◽  
Andrei Esafiev ◽  
...  

Abstract: in this publicaton, a technique to increase trust levels of foreign and domestic-made hardware-software platforms, which are used to create specialised devices and computing facilities, which are meeting safety requirements and protected from BIOS vulnerabilities, to work with classified information, was made. Problems, which developer might encounter, were listed; methods of troubleshooting were proposed, and conclusions were made. The purpose of research is to investigate an ability of designing trusted foreign and domestic-made hardwaresoftware platforms, protected from exploiting BIOS vulnerabilities. Research methods: in order to achieve the purpose of research, an analysis of Russian’s industrial-grade PC modules was made in order to choose PC module that will be used for designing trusted hardware-software platform, an analysis of known BIOS vulnerabilities was made; proprietary BIOS replacement in a form of domestic-made Horizon bootloader, which includes unauthorised access to information protection measures, was made and possibilty of practical use of trusted hardware-software platform with Horizon bootloader was overviewed. Obtained result: PC module for trusted hardware-software platform was selected, proprietary BIOS replacement in a form of domestic-made Horizon bootloader, which includes unauthorized access to information protection measures, was made; technique to increase trust levels of foreign and domestic-made hardware-software platforms, which are used to create specialized devices and computing facilities, which are meeting safety requirements and protected from BIOS vulnerabilities, to work with classified information, was made; an approach to create trusted hardware-software platform design requirements and conditions was made; needs to exclude potentially dangerous Intel Management Engine controller’s functionality were justified and proposal to use trusted hardware-software platform with Horizon bootloader was made.


1984 ◽  
Vol 1 (1) ◽  
pp. 175-185
Author(s):  
Michael E. D. Koenig

2020 ◽  
Vol 64 (1) ◽  
pp. 6-16 ◽  
Author(s):  
Sarah M. Meeßen ◽  
Meinald T. Thielsch ◽  
Guido Hertel

Abstract. Digitalization, enhanced storage capacities, and the Internet of Things increase the volume of data in modern organizations. To process and make use of these data and to avoid information overload, management information systems (MIS) are introduced that collect, process, and analyze relevant data. However, a precondition for the application of MIS is that users trust them. Extending accounts of trust in automation and trust in technology, we introduce a new model of trust in MIS that addresses the conceptual ambiguities of existing conceptualizations of trust and integrates initial empirical work in this field. In doing so, we differentiate between perceived trustworthiness of an MIS, experienced trust in an MIS, intentions to use an MIS, and actual use of an MIS. Moreover, we consider users’ perceived risks and contextual factors (e. g., autonomy at work) as moderators. The introduced model offers guidelines for future research and initial suggestions to foster trust-based MIS use.


1993 ◽  
Vol 38 (10) ◽  
pp. 1094-1095
Author(s):  
Scott P. Robertson
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document