电子签名的形式及其在安全资讯系统中的使用特点

S. Palamarchuk, Natalia Palamarchuk, V. Tkach, Olga Shugaly
{"title":"电子签名的形式及其在安全资讯系统中的使用特点","authors":"S. Palamarchuk, Natalia Palamarchuk, V. Tkach, Olga Shugaly","doi":"10.28925/2663-4023.2021.14.100106","DOIUrl":null,"url":null,"abstract":"The Law of Ukraine “On Electronic Documents” and “On Electronic Digital Signature”, which came into force on December 28, 2003 and January 1, 2004, respectively, gave the “green light” to the widespread use of electronic documents and digital signatures in the country. Continuation in the introduction of electronic documents, including electronic signature forms and their use in secure information systems, was the adoption in 2018 of the Law of Ukraine \"On electronic trust services\" (Law of Ukraine \"On electronic digital signature\" expired) and a number of bylaws regarding electronic interaction between two information resources (state registers / information and telecommunication systems…) and / or for the provision of administrative services. At the same time, the use of the latest technologies aimed at increasing the efficiency of work creates new risks that can lead to the disclosure of sensitive information, the consequences of which can be critical. To prevent this from happening, the system being created or the existing system must be well protected and comply with the Concept of \"Secure Information Systems\". This Concept includes a number of legislative initiatives, scientific, technical and technological solutions. Also, it is necessary to refer to the definition of a reliable information system, which is provided in the \"Orange Book\". According to which, a reliable information system is defined as “a system that uses sufficient hardware and software to ensure the simultaneous reliable processing of information of varying degrees of secrecy by different users or groups of users without violating access rights, integrity and confidentiality of data and information, and which maintains its performance under the influence of a set of external and internal threats. \" Today, among the established methods of information protection, a special place is occupied by an electronic signature (both for verifying the integrity of the document, confirmation of authorship and for user authentication).","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"FORMS OF ELECTRONIC SIGNATURE AND FEATURES OF ITS USE IN SECURED INFORMATION SYSTEMS\",\"authors\":\"S. Palamarchuk, Natalia Palamarchuk, V. Tkach, Olga Shugaly\",\"doi\":\"10.28925/2663-4023.2021.14.100106\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Law of Ukraine “On Electronic Documents” and “On Electronic Digital Signature”, which came into force on December 28, 2003 and January 1, 2004, respectively, gave the “green light” to the widespread use of electronic documents and digital signatures in the country. Continuation in the introduction of electronic documents, including electronic signature forms and their use in secure information systems, was the adoption in 2018 of the Law of Ukraine \\\"On electronic trust services\\\" (Law of Ukraine \\\"On electronic digital signature\\\" expired) and a number of bylaws regarding electronic interaction between two information resources (state registers / information and telecommunication systems…) and / or for the provision of administrative services. At the same time, the use of the latest technologies aimed at increasing the efficiency of work creates new risks that can lead to the disclosure of sensitive information, the consequences of which can be critical. To prevent this from happening, the system being created or the existing system must be well protected and comply with the Concept of \\\"Secure Information Systems\\\". This Concept includes a number of legislative initiatives, scientific, technical and technological solutions. Also, it is necessary to refer to the definition of a reliable information system, which is provided in the \\\"Orange Book\\\". According to which, a reliable information system is defined as “a system that uses sufficient hardware and software to ensure the simultaneous reliable processing of information of varying degrees of secrecy by different users or groups of users without violating access rights, integrity and confidentiality of data and information, and which maintains its performance under the influence of a set of external and internal threats. \\\" Today, among the established methods of information protection, a special place is occupied by an electronic signature (both for verifying the integrity of the document, confirmation of authorship and for user authentication).\",\"PeriodicalId\":198390,\"journal\":{\"name\":\"Cybersecurity: Education, Science, Technique\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Cybersecurity: Education, Science, Technique\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.28925/2663-4023.2021.14.100106\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cybersecurity: Education, Science, Technique","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.28925/2663-4023.2021.14.100106","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

乌克兰《电子文件法》和《电子数字签名法》分别于2003年12月28日和2004年1月1日生效,为电子文件和数字签名在该国的广泛使用开了绿灯。继续引入电子文件,包括电子签名形式及其在安全信息系统中的使用,是在2018年通过了乌克兰“电子信任服务法”(乌克兰“电子数字签名法”已过期)和一些关于两个信息资源(国家登记册/信息和电信系统……)之间的电子交互和/或提供行政服务的细则。同时,使用旨在提高工作效率的最新技术产生了新的风险,可能导致敏感信息泄露,其后果可能十分严重。为了防止这种情况发生,正在创建的系统或现有系统必须得到很好的保护,并符合“安全信息系统”的概念。这一概念包括一系列立法举措、科学、技术和技术解决方案。此外,有必要参考“橙皮书”中提供的可靠信息系统的定义。据此,可靠的信息系统被定义为“使用足够的硬件和软件,确保不同用户或用户组同时可靠地处理不同保密程度的信息,而不侵犯数据和信息的访问权、完整性和保密性,并在一系列外部和内部威胁的影响下保持其性能的系统。”今天,在已建立的信息保护方法中,电子签名占据了一个特殊的位置(用于验证文档的完整性、确认作者身份和用户身份验证)。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
FORMS OF ELECTRONIC SIGNATURE AND FEATURES OF ITS USE IN SECURED INFORMATION SYSTEMS
The Law of Ukraine “On Electronic Documents” and “On Electronic Digital Signature”, which came into force on December 28, 2003 and January 1, 2004, respectively, gave the “green light” to the widespread use of electronic documents and digital signatures in the country. Continuation in the introduction of electronic documents, including electronic signature forms and their use in secure information systems, was the adoption in 2018 of the Law of Ukraine "On electronic trust services" (Law of Ukraine "On electronic digital signature" expired) and a number of bylaws regarding electronic interaction between two information resources (state registers / information and telecommunication systems…) and / or for the provision of administrative services. At the same time, the use of the latest technologies aimed at increasing the efficiency of work creates new risks that can lead to the disclosure of sensitive information, the consequences of which can be critical. To prevent this from happening, the system being created or the existing system must be well protected and comply with the Concept of "Secure Information Systems". This Concept includes a number of legislative initiatives, scientific, technical and technological solutions. Also, it is necessary to refer to the definition of a reliable information system, which is provided in the "Orange Book". According to which, a reliable information system is defined as “a system that uses sufficient hardware and software to ensure the simultaneous reliable processing of information of varying degrees of secrecy by different users or groups of users without violating access rights, integrity and confidentiality of data and information, and which maintains its performance under the influence of a set of external and internal threats. " Today, among the established methods of information protection, a special place is occupied by an electronic signature (both for verifying the integrity of the document, confirmation of authorship and for user authentication).
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信