电子签名的形式及其在安全资讯系统中的使用特点

S. Palamarchuk, Natalia Palamarchuk, V. Tkach, Olga Shugaly
{"title":"电子签名的形式及其在安全资讯系统中的使用特点","authors":"S. Palamarchuk, Natalia Palamarchuk, V. Tkach, Olga Shugaly","doi":"10.28925/2663-4023.2021.14.100106","DOIUrl":null,"url":null,"abstract":"The Law of Ukraine “On Electronic Documents” and “On Electronic Digital Signature”, which came into force on December 28, 2003 and January 1, 2004, respectively, gave the “green light” to the widespread use of electronic documents and digital signatures in the country. Continuation in the introduction of electronic documents, including electronic signature forms and their use in secure information systems, was the adoption in 2018 of the Law of Ukraine \"On electronic trust services\" (Law of Ukraine \"On electronic digital signature\" expired) and a number of bylaws regarding electronic interaction between two information resources (state registers / information and telecommunication systems…) and / or for the provision of administrative services. At the same time, the use of the latest technologies aimed at increasing the efficiency of work creates new risks that can lead to the disclosure of sensitive information, the consequences of which can be critical. To prevent this from happening, the system being created or the existing system must be well protected and comply with the Concept of \"Secure Information Systems\". This Concept includes a number of legislative initiatives, scientific, technical and technological solutions. Also, it is necessary to refer to the definition of a reliable information system, which is provided in the \"Orange Book\". According to which, a reliable information system is defined as “a system that uses sufficient hardware and software to ensure the simultaneous reliable processing of information of varying degrees of secrecy by different users or groups of users without violating access rights, integrity and confidentiality of data and information, and which maintains its performance under the influence of a set of external and internal threats. \" Today, among the established methods of information protection, a special place is occupied by an electronic signature (both for verifying the integrity of the document, confirmation of authorship and for user authentication).","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"FORMS OF ELECTRONIC SIGNATURE AND FEATURES OF ITS USE IN SECURED INFORMATION SYSTEMS\",\"authors\":\"S. Palamarchuk, Natalia Palamarchuk, V. Tkach, Olga Shugaly\",\"doi\":\"10.28925/2663-4023.2021.14.100106\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Law of Ukraine “On Electronic Documents” and “On Electronic Digital Signature”, which came into force on December 28, 2003 and January 1, 2004, respectively, gave the “green light” to the widespread use of electronic documents and digital signatures in the country. Continuation in the introduction of electronic documents, including electronic signature forms and their use in secure information systems, was the adoption in 2018 of the Law of Ukraine \\\"On electronic trust services\\\" (Law of Ukraine \\\"On electronic digital signature\\\" expired) and a number of bylaws regarding electronic interaction between two information resources (state registers / information and telecommunication systems…) and / or for the provision of administrative services. At the same time, the use of the latest technologies aimed at increasing the efficiency of work creates new risks that can lead to the disclosure of sensitive information, the consequences of which can be critical. To prevent this from happening, the system being created or the existing system must be well protected and comply with the Concept of \\\"Secure Information Systems\\\". This Concept includes a number of legislative initiatives, scientific, technical and technological solutions. Also, it is necessary to refer to the definition of a reliable information system, which is provided in the \\\"Orange Book\\\". According to which, a reliable information system is defined as “a system that uses sufficient hardware and software to ensure the simultaneous reliable processing of information of varying degrees of secrecy by different users or groups of users without violating access rights, integrity and confidentiality of data and information, and which maintains its performance under the influence of a set of external and internal threats. \\\" Today, among the established methods of information protection, a special place is occupied by an electronic signature (both for verifying the integrity of the document, confirmation of authorship and for user authentication).\",\"PeriodicalId\":198390,\"journal\":{\"name\":\"Cybersecurity: Education, Science, Technique\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Cybersecurity: Education, Science, Technique\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.28925/2663-4023.2021.14.100106\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cybersecurity: Education, Science, Technique","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.28925/2663-4023.2021.14.100106","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

乌克兰《电子文件法》和《电子数字签名法》分别于2003年12月28日和2004年1月1日生效,为电子文件和数字签名在该国的广泛使用开了绿灯。继续引入电子文件,包括电子签名形式及其在安全信息系统中的使用,是在2018年通过了乌克兰“电子信任服务法”(乌克兰“电子数字签名法”已过期)和一些关于两个信息资源(国家登记册/信息和电信系统……)之间的电子交互和/或提供行政服务的细则。同时,使用旨在提高工作效率的最新技术产生了新的风险,可能导致敏感信息泄露,其后果可能十分严重。为了防止这种情况发生,正在创建的系统或现有系统必须得到很好的保护,并符合“安全信息系统”的概念。这一概念包括一系列立法举措、科学、技术和技术解决方案。此外,有必要参考“橙皮书”中提供的可靠信息系统的定义。据此,可靠的信息系统被定义为“使用足够的硬件和软件,确保不同用户或用户组同时可靠地处理不同保密程度的信息,而不侵犯数据和信息的访问权、完整性和保密性,并在一系列外部和内部威胁的影响下保持其性能的系统。”今天,在已建立的信息保护方法中,电子签名占据了一个特殊的位置(用于验证文档的完整性、确认作者身份和用户身份验证)。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
FORMS OF ELECTRONIC SIGNATURE AND FEATURES OF ITS USE IN SECURED INFORMATION SYSTEMS
The Law of Ukraine “On Electronic Documents” and “On Electronic Digital Signature”, which came into force on December 28, 2003 and January 1, 2004, respectively, gave the “green light” to the widespread use of electronic documents and digital signatures in the country. Continuation in the introduction of electronic documents, including electronic signature forms and their use in secure information systems, was the adoption in 2018 of the Law of Ukraine "On electronic trust services" (Law of Ukraine "On electronic digital signature" expired) and a number of bylaws regarding electronic interaction between two information resources (state registers / information and telecommunication systems…) and / or for the provision of administrative services. At the same time, the use of the latest technologies aimed at increasing the efficiency of work creates new risks that can lead to the disclosure of sensitive information, the consequences of which can be critical. To prevent this from happening, the system being created or the existing system must be well protected and comply with the Concept of "Secure Information Systems". This Concept includes a number of legislative initiatives, scientific, technical and technological solutions. Also, it is necessary to refer to the definition of a reliable information system, which is provided in the "Orange Book". According to which, a reliable information system is defined as “a system that uses sufficient hardware and software to ensure the simultaneous reliable processing of information of varying degrees of secrecy by different users or groups of users without violating access rights, integrity and confidentiality of data and information, and which maintains its performance under the influence of a set of external and internal threats. " Today, among the established methods of information protection, a special place is occupied by an electronic signature (both for verifying the integrity of the document, confirmation of authorship and for user authentication).
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
DESIGN OF BIOMETRIC PROTECTION AUTHENTIFICATION SYSTEM BASED ON K-AVERAGE METHOD CRYPTOVIROLOGY: SECURITY THREATS TO GUARANTEED INFORMATION SYSTEMS AND MEASURES TO COMBAT ENCRYPTION VIRUSES MODEL OF CURRENT RISK INDICATOR OF IMPLEMENTATION OF THREATS TO INFORMATION AND COMMUNICATION SYSTEMS SELECTION OF AGGREGATION OPERATORS FOR A MULTI-CRITERIA EVALUTION OF SUTABILITY OF TERRITORIES GETTING AND PROCESSING GEOPRODITIONAL DATA WITH MATLAB MAPPING TOOLBOX
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1