Document Management System with Enhanced Security
نویسندگان
چکیده
منابع مشابه
Security Enhanced RFID Middleware System
Recently, the RFID (Radio Frequency Identification) technology attracts the world market attention as essential technology for ubiquitous environment. The RFID market has focused on transponders and reader development. But that concern has shifted to RFID software like as high-valued e-business applications, RFID middleware and related development tools. However, due to the high sensitivity of ...
متن کاملOBDMS - A Document Management System
Document Management Systems (DMSs) are playing an increasingly critical role in organizational knowledge management. However, the most often used DMSs, such as windows Resources Manager, cannot settle the issues like inefficient query and redundancy because of the lack of document content and relationship management. In this paper, we present a prototyping system, based on improved CBR and two-...
متن کاملA Survey: An Advanced Key Management Technique with Enhanced Security SCADA System
Modern industrial facilities have command and control systems. These industrial command and control systems are commonly called supervisory control and data acquisition (SCADA).In this paper, we analyze several security issues in SCADA systems. We classify these issues based on key management, vulnerability and survivability. Using this standardized security techniques we can easily compare & c...
متن کاملSecurity Enhanced Distributed Knowledge Management Architecture
From the emergence of Knowledge Management (KM) systems until today, the vast majority of the implemented systems have concentrated on a centralised architecture, which utilizes knowledge within a single organizational domain. Lately, there is much focus on alternative, distributed approaches, which attempt to overcome the single organization’s KM paradigm, and develop inter-organizational know...
متن کاملCombining Provenance and Security Policies in a Web-based Document Management System
Provenance and security are intimately related. Cheney et al. [3] show that the dependencies underlying provenance information also underly information flow security policies. Provenance information can also play a role in history-based access control policies [1]. Many real applications have the need to combine a variety of security policies with provenance tracking. For instance, an online st...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IOSR Journal of Computer Engineering
سال: 2012
ISSN: 2278-8727,2278-0661
DOI: 10.9790/0661-0121823