[go: up one dir, main page]

Gojkovi - Google Patents

JAVA BASED SYSTEMS SECURITY

Gojkovi

View PDF
Document ID
8392708728532600915
Author
Gojkovi A

External Links

Snippet

Organizations need to use security techniques to protect their resources and information. No company gives away its assets unless it no longer wishes to stay in business, and information is one of the most important and strongest assets a company has. This paper …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies

Similar Documents

Publication Publication Date Title
USRE47443E1 (en) Document security system that permits external users to gain access to secured files
US8127366B2 (en) Method and apparatus for transitioning between states of security policies used to secure electronic documents
US9286484B2 (en) Method and system for providing document retention using cryptography
US8327138B2 (en) Method and system for securing digital assets using process-driven security policies
US7748045B2 (en) Method and system for providing cryptographic document retention with off-line access
US20050071657A1 (en) Method and system for securing digital assets using time-based security criteria
US7730543B1 (en) Method and system for enabling users of a group shared across multiple file security systems to access secured files
Kapil et al. Attribute based honey encryption algorithm for securing big data: Hadoop distributed file system perspective
US20020046350A1 (en) Method and system for establishing an audit trail to protect objects distributed over a network
US20050086531A1 (en) Method and system for proxy approval of security changes for a file security system
US20030051172A1 (en) Method and system for protecting digital objects distributed over a network
WO2002023798A1 (en) System for protecting objects distributed over a network
US8707034B1 (en) Method and system for using remote headers to secure electronic files
KR100286904B1 (en) System and method for security management on distributed PC
Gojkovi JAVA BASED SYSTEMS SECURITY
Scarioni et al. The Scope of Security
Rao Threats and security of Web services-a theoretical short study
Maheshwari Database Security for the Web.
Kale Secure group collaboration using AES-256 with audit report to avoid repudiation In Google drive
Hodges et al. Security and privacy considerations for the oasis security assertion markup language (saml)
Daniels Making e‐mail secure
Blom et al. Object Security and Personal Information Management
Giansiracusa THE SECURE TRUSTED AGENT PROXY SERVER ARCHITECTURE
Thing Distributed Systems
Dhillon SECURITY AT THE OPERATING SYSTEM LEVEL (MICROSOFT)