The second chapter describes the two keys that are assigned to the user - open (public) and closed (private). The first is available for everyone (will be used to check the authenticity of the signature and the document), and the second one – only to the user. To sign a document the hash is calculated (the encryption of the whole half mega bait document is quite resource intensive), the hash is encrypted with a private key.
The main threats of security for the electronic document management are described. Based on the threats to electronic documents the model of unprotected and protected ED enterprise is schematically represented.
During the practical implementation of the presented formal model the methods and tools of discrete mathematics are used.
To create a formal model of a composite document management the real object should be examined to identify its behavior scenarios and protocol properties, the aggregate of which is the interface with the outside world. Formally the process of document management is submitted in the form of three finite sets (the set of participants, the set of activities, the set documents’ states) and the relations of the elements of these sets with each other.
The diagram of the upper level is implemented using the IDEF0 methodology. The main component is the work (activity), it is titles "IP Electronic Document." The functional decomposition of activity of "IP Electronic Document" is also based on the IDEF0 methodology. In the projected model logical-physical model is used. ER-diagram of the system is on entities level. Based on the characteristics of the subject area, selected objects and their attributes, developed relationships structure ER-diagram on the logical level was built.
In the process of creating physical data model several field values of types of data were adjusted in accordance with the implementation of the database.
The physical description of the model is presented in the form tables. Project database contains tables, the titles of which match the titles of entities of infological model.
Normative-reference documentation is quickly entered by an employee who works in the software product and is located in the directories and is updated as changes occur in-house regulations at all levels.
The factor of the PC performance plays the most important role when choosing the hardware for the development of the system since the time of program development depends on it, therefore development costs and its cost.
Достарыңызбен бөлісу: |