System to Track Access in Digital Economy Systems
Readers community rating
0.0 (0 votes)


Date of publication
Public year
System to Track Access in Digital Economy Systems
Read   Download pdf

Leakage of protected data became an acute topic. The system tracking who, where and when has accessed a certain record of such a type of data could be a help in investigating vulnerabilities and weaknesses in defense. Also, it could name and point out responsible staff for the leakage with all legal and justice consequences. The paper considers an approach to build a system to register such kind of facts. The essence is to apply the distributed ledger technology, which is an open data storage. The system allows you to identify users who are trying to retrieve valuable information. At present, a technical and theoretical basis is ready for such solutions. Analysis of the current situation in the area under consideration shows that all the leading players in this segment of the IT market, in parallel with the development of mathematical models and methods of problem-oriented data mining, pay significant attention to the development of special software and hardware tools to support the performance of such tool solutions.


1. Agrawal, Rakesh, Tomasz Imieliński, Arun Swami. 1993. Mining association rules between sets of items in large databases. Proceedings of the 1993 ACM SIGMOD international conference on Management of data, June 1993, N.-Y., 207 – 216.

2. Agrawal, Rakesh, and Ramakrishnan Srikant. 1994. Fast Algorithms for Mining Association Rules. Proceedings of the 20th VLDB Conference Santiago, Chile, 1994, 487-499.

3. Baird, Leemon, Mance Harmon, and Paul Madsen. 2019. Hedera: A Public Hashgraph. Network & Governing Council. The trust layer of the internet.

4. Becker, Georg. 2008. “Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis.”

5. Chen Tai-Yuan, Wei-Ning Huang, Po-Chun Kuo, Hao Chung, and Tzu-Wei Chao. 2018. A Highly Scalable, Decentralized DAG-Based Consensus Algorithm.

6. Churyumov, Anton. 2016. “Byteball: A Decentralized System for Storage and Transfer of Value.”

7. Cohen, Paul. 2015. Big Mechanism (DARPA Big Mechanism Program). Physical Biology 12(4).

8. Department of Defense Trusted Computer System Evaluation Criteria, DoD. 1985. Accessed April 10, 2021.

9. Directed Acyclic Graphs (DAGs). In Version Control by Example.

10. ENISA. n.d. “ISO/IEC Standard 15408 - Information technology -- Security techniques -- Evaluation criteria for IT security.” Accessed April 10, 2021.

11. Finn, Victor et al. 2009. Automatic Generation of Hypotheses in Intelligent Systems, edited by Victor Finn. 2009. Moscow: Librokom.

12. Finn, Victor. 2011. J.S. Mill’s inductive methods in artificial intelligence systems. Scientific and Technical Information Processing 38(6): 385–402.

13. Finn, Victor. 2012. J.S. Mill’s inductive methods in artificial intelligence systems. Scientific and Technical Information Processing 39(5): 241–260.

14. Grusho, Alexander, Mikhail Zabezhailo, Alexander Zatsarinnyi, Victor Piskovskii, Sergey Borokhov. 2015. On the potential applications of data mining for information security provision of cloud-based environments. Automatic Documentation and Mathematical Linguistics 49(6): 193-201.

15. Grusho, Alexander, Nikolay Grusho, Mikhail Zabezhailo and Elena Timonina. 2019. “Protection of valuable information in public information space” Communications of the ECMS. Proceedings of the 33th European Conference on Modelling and Simulation 33(1): 451–455.

16. Harris-Braun, Eric, Nicolas Luck, and Arthur Brock. 2018. Holochain. Scalable agent-centric distributed computing,” DRAFT (ALPHA 1) - 2/15/2018.

17. Hauge, Bjorn. 2018. SWIFTNet, VisaNet and Blockchain: The Future of Clearing.

18. IBM Cloud Services. n.d. Accessed April 10, 2021.

19. Lally, Adam, Sugato Bachi, Michael Barborak, David Buchanan, Jennifer Chu-Carroll, David Ferrucci, Michael Glass, Aditya Kalyanpur, Erik Mueller, William Murdock et al. 2014. WatsonPaths: Scenario-based Question Answering and Inference over Unstructured Information (IBM Research Report RC25489).

20. Leemon, Baird. 2016. “The Swirlds Hashgraph Consensus Algorithm: Fair, Fast, Byzantine Fault Tolerance.”

21. Pearl, Judea. 2000. Causality: Models, Reasoning, and Inference. Cambridge: Cambridge University Press.

22. Piskovski, Victor, Alexander Grusho, Mikhail Zabezhailo, Andrey Nikolaev, Vladimir Senchilo, and Elena Timonina. 2020. Security Architectures in Digital Economy Systems, International. Journal of Open Information Technologies 8(9): 48-52.

23. Plotkin, Gordon. 1970. “A Note on Inductive Generalization.” In Machine Intelligence 5. 153-164. Edinburgh: Edinburgh University Press.

24. Plotkin, Gordon. 1971. “A Further Note on Inductive Generalization.” In Machine Intelligence 6. 101-124. Edinburgh: Edinburgh University Press.

25. Rudakov, Konstantin. 1986. Some universal restrictions for classification algorithms. Zh. Vychisl. Mat. Mat. Fiz. 26(11): 1719–1730.

26. SAS Institute. n.d. FORTUNE: 100 Best Companies to Work for. Accessed April 10, 2021.

27. SAS Institute Inc. n.d. Patent applications. Accessed April 10, 2021.

28. SAS Institute Inc. 2013. Data Mining Using SAS Enterprise MinerTM: A Case Study Approach.

29. SAS Institute Inc. 2015. SAS/STAT 14.1 User’s Guide: High-Performance Procedures.

30. SAS Institute Inc. 2015. Base SAS. High-Performance Procedures. Accessed April 10, 2021.

31. Sobti, Rajeev, and Ganesan Geetha. 2012. Cryptographic Hash Functions: A Review. International Journal of Computer Science Issues 9(2): 461-479.

32. Stathakopoulou,

33. Su, Tzong-An, and Gultekin Özsoyoglu. 1987. “Data Dependencies and Inference Control in Multilevel Relational Database Systems.” In Proceedings of the IEEE Symposium on Security and Privacy: 202-202.

34. TAdviser. 2020. Systems of BI and Big Data in Russia. Accessed April 10, 2021.

35. VISA. Accessed April 10, 2021.

36. Wikipedia. Merkle Tree. Accessed April 10, 2021.

37. Zabezhailo, Mikhail. 2014. Some capabilities of enumeration control in the DSM method. Scientific and Technical Information Processing 41(6): 335–361.

38. Zhu, Wei-Dong, Bob Foyle, Daniel Gagné, Vijay Gupta, Josemina Magdalen, Amarjeet Mundi, Tetsuya Nasukawa, Mark Paulis, Jane Singer and Martin Triska. 2014. IBM Watson Content Analytics: Discovering Actionable Insight from Your Content IBM Redbooks: IBM Corp.

39. Zhuravlev, Yuri. 1977. Correct algebras on sets of incorrect (heuristic) algorithms. Kibernetika 4: 5–17.

40. Zhuravlev, Yuri. 1977. Correct algebras on sets of incorrect (heuristic) algorithms. Kibernetika 6: 21–27.;

41. Zhuravlev, Yuri. 1978. Correct algebras on sets of incorrect (heuristic) algorithms. Kibernetika 2: 35–43.

42. Zhuravlev, Yuri, Vladimir Ryazanov, and Oleg Sen’ko. 2006. “Recognition.” Mathematical Methods. Software System. Practical Applications. Moscow: Fazis.

Полная версия доступна только подписчикам
Подпишитесь прямо сейчас