Background And Document

Background and document management problems in the paper, the concept of file and the role of the archivist in various fields such as in the custody of notarial protocol or medical records are widely recognized, while its electronic equivalent. When documents have a legal consideration or certain safety requirements, it becomes necessary to provide certain guarantees on them, allowing those who need it, be confident about its authenticity and its future availability. With the advent of electronic records, although the objectives are the same, the paradigm changed and therefore the mechanisms are very different. More information is housed here: Samsung. The main problem comes from the use of digital signatures as a mechanism to ensure the authenticity of the document.The digital signature introduces a dependency chain between the document and the data used to generate the signature, which means that if in future any of these items used to produce the signature no longer valid or loses their security, not to validate the electronic record itself without additional measures. In this paper imply that a handwritten signature would not validate if you lose your bol grago that was used to produce it, something that would be absurd but it happens to their electronic equivalent, since the validity of the electronic document depends, among others, the type signature, the validity of the certificate, the strength of cryptographic algorithms used in the time of signing / validation, certification authority that issued the certificate (if it was known at the time in which it was signed), the consideration of safe device signature creation of the rules, … Besides there are other difficulties caused by the holder ceases to be physical, to be electronic.For example, disappears among others the original concept as we understand it in paper as an electronic copy is identical to another (in fact what we see on screen is a copy in memory of what is stored). It also occurs in many cases what you see does not correspond to the actual content of the document since that dissociate data format and therefore a single electronic document may be forms of representation that differs, which does not happen on paper. Regarding access control and traceability, when controlling access to an electronic document, there are situations like the phenomenon of online music (mp3), which are valid either conventional models used in applications that pivot about a user and profile, assuming that the user has login and is known by the system. Generally, access control revolves around the document itself, since it may be distributed to users not previously known as a digital object in a standard format (egPDF), without having to involve access to centralized application to read it as such. Click Samsung to learn more. Who is the document itself can contain its access policies, the implementation can vary according to context and time (ie is a confidential document for n years and public hearing by certain events such as death, end of conflict, etc. ..).