{"title":"System to Track Access in Digital Economy Systems","authors":"A. Grusho","doi":"10.18254/s123456780015725-8","DOIUrl":null,"url":null,"abstract":"Leakage of protected data became an acute topic. The system tracking who, where and when has accessed a certain record of such a type of data could be a help in investigating vulnerabilities and weaknesses in defense. Also, it could name and point out responsible staff for the leakage with all legal and justice consequences. The paper considers an approach to build a system to register such kind of facts. The essence is to apply the distributed ledger technology, which is an open data storage. The system allows you to identify users who are trying to retrieve valuable information. At present, a technical and theoretical basis is ready for such solutions. Analysis of the current situation in the area under consideration shows that all the leading players in this segment of the IT market, in parallel with the development of mathematical models and methods of problem-oriented data mining, pay significant attention to the development of special software and hardware tools to support the performance of such tool solutions.","PeriodicalId":151342,"journal":{"name":"Law & Digital Technologies","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Law & Digital Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.18254/s123456780015725-8","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Leakage of protected data became an acute topic. The system tracking who, where and when has accessed a certain record of such a type of data could be a help in investigating vulnerabilities and weaknesses in defense. Also, it could name and point out responsible staff for the leakage with all legal and justice consequences. The paper considers an approach to build a system to register such kind of facts. The essence is to apply the distributed ledger technology, which is an open data storage. The system allows you to identify users who are trying to retrieve valuable information. At present, a technical and theoretical basis is ready for such solutions. Analysis of the current situation in the area under consideration shows that all the leading players in this segment of the IT market, in parallel with the development of mathematical models and methods of problem-oriented data mining, pay significant attention to the development of special software and hardware tools to support the performance of such tool solutions.