Document Management System with Enhanced Security

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Enhanced RFID Middleware System

Recently, the RFID (Radio Frequency Identification) technology attracts the world market attention as essential technology for ubiquitous environment. The RFID market has focused on transponders and reader development. But that concern has shifted to RFID software like as high-valued e-business applications, RFID middleware and related development tools. However, due to the high sensitivity of ...

متن کامل

OBDMS - A Document Management System

Document Management Systems (DMSs) are playing an increasingly critical role in organizational knowledge management. However, the most often used DMSs, such as windows Resources Manager, cannot settle the issues like inefficient query and redundancy because of the lack of document content and relationship management. In this paper, we present a prototyping system, based on improved CBR and two-...

متن کامل

A Survey: An Advanced Key Management Technique with Enhanced Security SCADA System

Modern industrial facilities have command and control systems. These industrial command and control systems are commonly called supervisory control and data acquisition (SCADA).In this paper, we analyze several security issues in SCADA systems. We classify these issues based on key management, vulnerability and survivability. Using this standardized security techniques we can easily compare & c...

متن کامل

Security Enhanced Distributed Knowledge Management Architecture

From the emergence of Knowledge Management (KM) systems until today, the vast majority of the implemented systems have concentrated on a centralised architecture, which utilizes knowledge within a single organizational domain. Lately, there is much focus on alternative, distributed approaches, which attempt to overcome the single organization’s KM paradigm, and develop inter-organizational know...

متن کامل

Combining Provenance and Security Policies in a Web-based Document Management System

Provenance and security are intimately related. Cheney et al. [3] show that the dependencies underlying provenance information also underly information flow security policies. Provenance information can also play a role in history-based access control policies [1]. Many real applications have the need to combine a variety of security policies with provenance tracking. For instance, an online st...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IOSR Journal of Computer Engineering

سال: 2012

ISSN: 2278-8727,2278-0661

DOI: 10.9790/0661-0121823