{"title":"公司信息系统中数据防御过程的自动化","authors":"T. Karlova, S. Sheptunov, N. Kuznetsova","doi":"10.1109/ITMQIS.2017.8085797","DOIUrl":null,"url":null,"abstract":"As a rule, large modern enterprises use not only one but several information systems: APCS, CAD/CAM/CAE, SCADA. These systems create the complex environment of interacting structures which include storage, processing, translation confidential information modules. The goal is to integrate and automate the processes of information defence in the systems with minimal impact on their productivity.","PeriodicalId":231514,"journal":{"name":"2017 International Conference \"Quality Management,Transport and Information Security, Information Technologies\" (IT&QM&IS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":"{\"title\":\"Automation of data defence processes in the corporation information systems\",\"authors\":\"T. Karlova, S. Sheptunov, N. Kuznetsova\",\"doi\":\"10.1109/ITMQIS.2017.8085797\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As a rule, large modern enterprises use not only one but several information systems: APCS, CAD/CAM/CAE, SCADA. These systems create the complex environment of interacting structures which include storage, processing, translation confidential information modules. The goal is to integrate and automate the processes of information defence in the systems with minimal impact on their productivity.\",\"PeriodicalId\":231514,\"journal\":{\"name\":\"2017 International Conference \\\"Quality Management,Transport and Information Security, Information Technologies\\\" (IT&QM&IS)\",\"volume\":\"50 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"14\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference \\\"Quality Management,Transport and Information Security, Information Technologies\\\" (IT&QM&IS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITMQIS.2017.8085797\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference \"Quality Management,Transport and Information Security, Information Technologies\" (IT&QM&IS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITMQIS.2017.8085797","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Automation of data defence processes in the corporation information systems
As a rule, large modern enterprises use not only one but several information systems: APCS, CAD/CAM/CAE, SCADA. These systems create the complex environment of interacting structures which include storage, processing, translation confidential information modules. The goal is to integrate and automate the processes of information defence in the systems with minimal impact on their productivity.