Education of the republic of uzbekistan tashkent state technical university named after islam karimov


Electrical and Computer Engineering



Download 17,18 Mb.
Pdf ko'rish
bet158/276
Sana22.07.2022
Hajmi17,18 Mb.
#840106
1   ...   154   155   156   157   158   159   160   161   ...   276
Bog'liq
Сборник журналя Техника Инновэйшн

Electrical and Computer Engineering
163 
Figure 1. Integrated EDMS approach 
 
Thus, unique identification is only possible through authentication. As a result, we get a 
logical chain: you cannot do without reliable identification, the most reliable identification is 
authentication, therefore, you cannot do without authentication. Moreover, strong 
authentication allows you not only to separate, but also to personalize access, that is, to make 
all users work, for example, with personal data, personally responsible for all their actions with 
this data. As mentioned above, in this case, it is necessary to make access to the minimum 
sufficient to perform work duties. The modern approach to organizing personalized access is 
the use of solutions based on PKI, and the authentication mechanism is the EDS procedure 
[15]. 
Considering all of the above, we can state that the general tasks for the organization of a 
secure EDMS are: 
• strong user authentication for organizing access to protected and informational 
resources using neural networks; 
• restricting access to confidential information and personal data; 
• blocking unauthorized access; 
• ensuring the availability of public information. 
CONCLUSION. 
EDMS can be used by organizations to automate processes, which 
makes them efficient and reduces costs. It promotes productivity and efficiency, improves 
communication between customers, business leaders, partners, employees, and serves 
customers in general through enhanced collaboration controlled by standard operating 
procedures. Another reason for deploying an EDMS is to reduce data redundancy and 
duplication of information. Although the implementation of the EDMS has brought many 
benefits, the implementation of the EDMS, like any other information system, is associated 
with a number of problems, mainly due to organizational and technological changes.
 
Integrated EDMS approach 
System user authentication
Distribution of access rights for 
employees-users of the EDMS
Support for electronic digital 
signature of documents
Encryption of letters and 
documents



Download 17,18 Mb.

Do'stlaringiz bilan baham:
1   ...   154   155   156   157   158   159   160   161   ...   276




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish