document security
Recently Published Documents


TOTAL DOCUMENTS

78
(FIVE YEARS 14)

H-INDEX

5
(FIVE YEARS 1)

Author(s):  
Deepa S. Deulkar

Cloud based data storage is becoming very popular nowadays as one can easily download any document from anytime and anywhere. However documents security is very important in cloud storage as cloud is a third party server which can be accessed by administrators. There are many literatures available to improve document security on cloud and most of the literatures proposed various data encryption techniques. However, simply encrypting data (e.g., via AES) cannot fully address the practical need of data management. Besides, an effective access control over download request also needs to be considered so that Economic Denial of Sustainability (EDoS) attacks cannot be launched to hinder users from enjoying service. In this project, we consider the dual access control, in the context of cloud-based storage, in the sense that we design a control mechanism over both data access and download request without loss of security and efficiency. Along with dual access control we also focus on document security by using modified AES algorithm.


2021 ◽  
Vol 8 (1) ◽  
pp. 41-48
Author(s):  
Yoshua Kenny Nugroho ◽  
Magdalena Ariance Ineke Pakereng

Saat ini, pengelolaan dokumen merupakan hal penting yang menentukan kelangsungan sebuah organisasi. Pengarsipan dokumen yang tidak dikelola dengan baik dapat menimbulkan banyak masalah. Selain itu, pembuktian keaslian dokumen merupakan hal yang tidak kalah penting. Pada tahun 2019, tercatat banyaknya kasus pemalsuan dokumen di Indonesia maupun di luar negeri. Sistem Manajemen Validasi Document Security ini dibangun menggunakan framework Laravel dan Bootstrap untuk tampilan web, MySQL untuk database, dan QR Code untuk validasi dokumen. Selain dapat mengelola dan validasi dokumen, sistem ini dilengkapi dengan web service yang dapat diintegrasikan dengan aplikasi lainnya. Dari pembuatan sistem ini diharapkan supaya proses pengelolaan dokumen menjadi lebih baik dan juga pemalsuan dokumen dapat diminimalisir.


2020 ◽  
Vol 29 (4) ◽  
pp. 85
Author(s):  
Mieczysław Goc ◽  
Dorota Semków

<p>Forgeries of documents concern almost all types – from ID cards, passports, to money marks and securities. This procedure is a serious threat to proper legal transactions. Security of legal transactions means the need to ensure the credibility of documents by caring for trust in the document as a formal way of ascertaining the law, legal relationship or circumstances that may have legal significance. For this reason, the document benefits from protection in many areas. There are nearly 400 legal acts in the legal system in force in Poland, the subject of which are documents. Representatives of the scientific community, lawyers and experts in the field of document research, however, have for years emphasized the need for a legal act to legally organize the issues of documents. The Act of 22 November 2018 on Public Documents, therefore, constitutes a long-awaited legal regulation and thus is an important element in the process of preventing crimes against the credibility of documents, filling the organizational and legal gap in the broadly understood issue of public documents. The Act had to be a form of coherent, comprehensive legal regulation that would be used in both administrative, civil and criminal law. Its solutions should be considered as correct and necessary in creating a system of public document security. The implementation of the provisions of the Act on Public Documents gives hope for comprehensive regulation of the indicated issues. Both from the perspective of securing the interests of the state and its citizens, the Act deserves a positive assessment of its provisions.</p>


JURNAL PETIK ◽  
2020 ◽  
Vol 6 (2) ◽  
pp. 20-33
Author(s):  
Melly Amalia ◽  
Lena Magdalena ◽  
Tiara Eka Putri

Archives have an important role in an agency or company to support administrative processes or activities carried out in the company. If the records are not well managed, it will be difficult to find the information that has been stored so that it can hinder further work processes. Therefore archives should be managed using a good and correct management system. The IT study program at the Catur Insan Cendekia Cirebon University does not yet have a filing system for data on rules, guidelines and SOP, so currently a system is needed that can help performance related to data archiving of rules, guidelines and SOP. In this study the authors implemented data archiving rules, guidelines and web-based SOP using the index field method to make it easier to search for data and maintain document security and was carried out using a codeigniter framework, using MYSQL as database management which is popularly used to build web applications that source. and data management using a database. The result of this data archiving system for rules, guidelines and SOP is that data retrieval does not need to take a lot of time and effort so that the required data can be accessed quickly and easily. So that data can be applied automatically based on the category so that data archiving is more effective and efficient.Keywords : Data Rules, Filing System, Guidelines, Index Field, Standar Operasional Prosedur, SOP.


2019 ◽  
Vol 1 (1) ◽  
pp. 42-48
Author(s):  
Sucipto Basuki ◽  
Reksa Anugrah

 Information security process can be done by hiding the information on other media or by certain methods, so that other people do not realize there is some information in the media. Technique known as Steganography and Cryptography. Steganography is a technique to hide or disguise the existence of secret messages in the media reservoirs. While Cryptography disguise the meaning of a message, but do not hide that there is a message. In a bank cannot be separated in the presence of inter-bank transactions which transfer if the transfer interbank transactions done in branch offices and nominal transaction exceeds the transaction limit branch offices will require official approval in the upper branch. How do I prove the authenticity of the document transfer transaction? Therefore, a company in the banking sector needs to be a medium to prove the validity of the document sent by the branch transaction. In this case the author has designed an application with a blend of steganography and cryptography techniques that can be used in testing the validity of the transaction document. By using steganographic techniques undercover in a media that has brought and cryptographic key assignment as random, then the document that is sent in the branch office can be proved.


Sign in / Sign up

Export Citation Format

Share Document