Cluster-type models in the logistics industry

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    The aim of the present article is to detect the basic principles of secure electronic document circulation (EDCS) systems for multi-location structure with multiple non-uniform connections. As far as the object of research is concerned, transport-logistical clusters are used. It is heterogeneous system with implicit classification. In the article were examined the basic stages of designing, methods and models of information security in electronic document circulation systems, operating in distributed network and interacting with other informational systems. The article contains analysis of regulatory and legal base in information security field of Russian Federation. The model of cluster information flows has been created for research purposes, based on hierarchical interaction model of transport-logistical cluster components. We describe transport-logistical cluster subjects, categorized information and supposed information assets. Based on potential threats and system vulnerabilities, mechanisms of EDCS information security have been described. EDCS data exchange process with another system, containing personal data has been described. As a result, a comprehensive set of measures was formed as well as information security tools based on requirements for data protection of personal data, and automated control systemsand transport-logistical cluster information systems at critical objects.


  • Keywords


    Transport and Logistics Clusters; Electronic Document Workflow Systems; Information Security; Distributed Systems Architecture.

  • References


      [1] The World Bank. LPI Global Rankings 2014. http://lpi.worldbank.org/international/global

      [2] Transport Strategy of Russian Federation for 2030 / Transport Department of Russia. Мoscow, 2014.http://www.mintrans.ru/upload/iblock/3cc/ts_proekt_16102008.pdf.

      [3] Prokofyeva, Т.А.; Klymenko, V.V. Logistics and Supply Chain Management. 2011, No. 6, 31–41.

      [4] Dosmukhamedov, B.R. ASTU Reports. Series: Management, Computer Science and Informatics. 2009, No. 2, 140–143.

      [5] Yong, Wu; Gengzhong, Feng; Nengmin, Wang; Huigang, Liang. Game of Information Security Investment: Impact of Attack Types and Network Vulnerability. 2015, vol. 36(1), 25–34.

      [6] Information Security Providing of Bank System of Russian Federation. Common Aspects: Russia Standard Bank STO BR IRBS-1.0-2014 / Russia Bank Order of 17.05.2014 No. Р-399. http://www.consultant.ru/document/cons_doc_LAW_163762

      [7] EDCS Architecture “Е1 Euphrates”http://www.evfrat.ru/about/architecture/.

      [8] Sokolov, S.S.; Karpina,А.S. In: “Scientific Student Community of XXI century. Technical Sciences”: Electronic Essays Collection as to Materials of XIХ International Student Research-to-Practice Conference. Novosibirsk: SIRAK. 2014, No. 4(19), 50–56 (in Russian).

      [9] On Adoption of Personal Data Security Requirements through their Processing in Personal Data of Information System: Order of Russian Federation Government. 01st November, 2012 No, 1119 // Official Gazette of Russian Federation. 2012, No. 45, 6257.

      [10] Classification Methodology of Government and Non-government Object Properties to Extra Important Objects / EMERCOM of Russia, 2012.

      [11] http://central.mchs.ru/upload/site4/files/bea08465669b520c2603f73058fe188a.pdf.

      [12] Order of FSTEC of Russia, 18th February, 2013 No. 21 “On Adoption of Content of Organization and Technical EDCS Measures as to Providing Data Safety through their Processing in Personal Data of Information Systems”.

      [13] Sokolov, S.S. Modern Science and Education Questions. 2015, No. 1.

      [14] www.science-education.ru/121-18583.

      [15] Sokolov, S.S.; Karpina,А.S. In: Reports of Materials of the III International Research-to-Practice Conference “Information Management Systems and Technologies”. Odessa: Odessa National Sea University. 2014, 277 (in Russian).

      [16] Chernyi, S., & Budnik, V. (2017). Methods for optimizing solutions when considering group arguments by team of experts. https://doi.org/10.1063/1.5009873.

      [17] Kovalnogova, N. M.; Sokolov, S. S.; Nyrkov, A. P. In: IOP Conference Series: Materials Science and Engineering, vol. 124, https://doi.org/10.1088/1757-899X/124/1/012066.

      [18] Boriev, Z.; Nyrkov, A.; Sokolov, S.; Chernyi, S. In: IOP Conference Series: Materials Science and Engineering, vol. 124, https://doi.org/10.1088/1757-899X/124/1/012006.

      [19] Sokolov, S.S.; Malov, S.S.; Karpina, A.S. Vestnik of Admiral Makarov State University of Maritime and Inland Shipping. 2014, No. 5(27), 148-157 (in Russian).

      [20] Nyrkov, A.; Sokolov, S.; Zhilenkov, A.; Chernyi, S. In: Proceedings of the 2016 IEEE North West Russia Section Young Researchers in Electrical and Electronic Engineering Conference, EIConRusNW. 2016, https://doi.org/10.1109/EIConRusNW.2016.7448264.

      [21] Kukushkin, I.; Sokolov, S.; Nyrkov, A.; Pavlova, L. In: Proceedings of the 2016 IEEE North West Russia Section Young Researchers in Electrical and Electronic Engineering Conference, EIConRusNW 2016, https://doi.org/10.1109/EIConRusNW.2016.7448166.

      [22] Boriev Z.; Nyrkov A.; Sokolov S; Chernyi S. In: IOP Conference Series: Materials Science and Engineering, vol. 124, p. 012006, 2016. https://doi.org/10.1088/1757-899X/124/1/012006.


 

View

Download

Article ID: 8788
 
DOI: 10.14419/ijet.v7i1.8788




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.