Securing the Core University Business Processes

نویسندگان

  • Veliko Ivanov
  • Monika Tzaneva
  • Alexandra Murdjeva
  • Valentin S. Kisimov
چکیده

In the paper are presented solutions for securing the core University Business Processes. A Method for identification which Business processes are critical for security point of view, on which is required to pay more attention for its securing. For securing of the elected Business processes is developed a new security system – Extended Certification Authority. Special Secure eDocument Management Architecture is developed, on which base are developed the solutions for securing the following University Business processes Delegation of exam permissions to lecturers, Recording exam marks, and Exchange management documents.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

مستندسازی گسترده فرایندها در بخش دولت: ارائه‌ یک راهکار

Government is facing numerous problems one of them is the lack of coordination in business processes. However, due to the size of the government, complexities and diversifications processes are hard to document, update and improve. This causes serious inefficiencies in managing the organizations which motivates process improvement and re-engineering. The first step to accomplish this goal is pr...

متن کامل

Enterprise Resource Planning and Business Intelligence: The Importance of Integration

The advancement of information and communications technologies (ICT) has significantly intensified market competition the world over. One of the most widespread solutions is the use of enterprise resource planning systems that has proved to support the integration and automation of the processes, the improvement of the performance, and the reduction of costs. ERP involves the planning and manag...

متن کامل

Understanding It Business Value Creation and Evaluation in Least Developed Economies

Acklesh Prasad The University of the South Pacific Suva, Fiji [email protected] ABSTRACT Information Technology (IT) is an important resource that can facilitate growth and development in both the developed and developing economies. The forces of globalisation increase the digital divide between the developed and developing economies is increasing. The least developed economies (LDEs) are the...

متن کامل

Concept drift detection in business process logs using deep learning

Process mining provides a bridge between process modeling and analysis on the one hand and data mining on the other hand. Process mining aims at discovering, monitoring, and improving real processes by extracting knowledge from event logs. However, as most business processes change over time (e.g. the effects of new legislation, seasonal effects and etc.), traditional process mining techniques ...

متن کامل

Ranking business processes maturity by modified rembrandt technique with considering CMMI dimensions

An organization’s value is substantiated by consistent, high quality processes engineered in its operations and the allocation of the limited resources to achieve the desired objective. Intrinsic to the development of a process are the articulation of a coherent workflow, identification of the optimal skillset required at each stage of the process, and commissioning of the right technology plat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010