Gojkovi - Google Patents
JAVA BASED SYSTEMS SECURITYGojkovi
View PDF- Document ID
- 8392708728532600915
- Author
- Gojkovi A
External Links
Snippet
Organizations need to use security techniques to protect their resources and information. No company gives away its assets unless it no longer wishes to stay in business, and information is one of the most important and strongest assets a company has. This paper …
- 238000000034 method 0 abstract description 14
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| USRE47443E1 (en) | Document security system that permits external users to gain access to secured files | |
| US8127366B2 (en) | Method and apparatus for transitioning between states of security policies used to secure electronic documents | |
| US9286484B2 (en) | Method and system for providing document retention using cryptography | |
| US8327138B2 (en) | Method and system for securing digital assets using process-driven security policies | |
| US7748045B2 (en) | Method and system for providing cryptographic document retention with off-line access | |
| US20050071657A1 (en) | Method and system for securing digital assets using time-based security criteria | |
| US7730543B1 (en) | Method and system for enabling users of a group shared across multiple file security systems to access secured files | |
| Kapil et al. | Attribute based honey encryption algorithm for securing big data: Hadoop distributed file system perspective | |
| US20020046350A1 (en) | Method and system for establishing an audit trail to protect objects distributed over a network | |
| US20050086531A1 (en) | Method and system for proxy approval of security changes for a file security system | |
| US20030051172A1 (en) | Method and system for protecting digital objects distributed over a network | |
| WO2002023798A1 (en) | System for protecting objects distributed over a network | |
| US8707034B1 (en) | Method and system for using remote headers to secure electronic files | |
| KR100286904B1 (en) | System and method for security management on distributed PC | |
| Gojkovi | JAVA BASED SYSTEMS SECURITY | |
| Scarioni et al. | The Scope of Security | |
| Rao | Threats and security of Web services-a theoretical short study | |
| Maheshwari | Database Security for the Web. | |
| Kale | Secure group collaboration using AES-256 with audit report to avoid repudiation In Google drive | |
| Hodges et al. | Security and privacy considerations for the oasis security assertion markup language (saml) | |
| Daniels | Making e‐mail secure | |
| Blom et al. | Object Security and Personal Information Management | |
| Giansiracusa | THE SECURE TRUSTED AGENT PROXY SERVER ARCHITECTURE | |
| Thing | Distributed Systems | |
| Dhillon | SECURITY AT THE OPERATING SYSTEM LEVEL (MICROSOFT) |