Design of an Automatic Password Protection Mechanism for Digital Documents
نویسندگان
چکیده
Maintaining digital security and privacy are critical issues in the modern workplace. Sensitive and proprietary data is frequently transmitted electronically, and with the large volume of such transmissions, it is inevitable that some material will be inadvertently sent to unintended recipients, leading potentially to the unintended revelation of private data. The paper reports on the design of an automatic mechanism for password protection of digital documents on a per-user basis. Recommended practices and details of architecture, approach and implementation are presented for the specific protection of Microsoft Excel documents, although the scheme can be generalized to other digital document management software.
منابع مشابه
ASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow
Fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. In untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious Trojans. Understanding the netlist topology is the ultimate goal of the reverse engineering process. In this paper, we propose...
متن کاملAnalyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications
The products of graphic design applications leave behind traces of digital information which can be used during a digital forensic investigation in cases where counterfeit documents have been created. This paper analyzes the digital forensics involved in the creation of counterfeit documents. This is achieved by first recognizing the digital forensic artifacts left behind from the use of graphi...
متن کاملProtection of Archival Documents from Photochemical Eects
Purpose: The purpose of this paper is to highlight the destructive effects of light on archival documents/paper materials. The research aims to explain the mechanism of photochemical degradation and the damaging effect of light on paper. It also tells us about the measures to be adopted to control the deteriorating effects of light on paper step by step. Design/Methodology/Approach: The res...
متن کاملAn Improved Two-party Password-Authenticated Key Agreement Protocol with Privacy Protection Based on Chaotic Maps
Since the 1990s, chaotic systems have widely used to cryptography which can be used to design kinds of secure protocols, digital signatures, hash functions and so on. Recently, Guo and Zhang proposed an chaotic public-key cryptosystem based key agreement protocol. In 2015, Lee has proved that Guo et al.’s scheme cannot resist off-line password guess attack. Then, Liu and Xue further point out t...
متن کاملحمایت از حق مؤلف در فضای سایبر در حقوق ملی و اسناد بینالمللی
Development of information technology and entrance to digital millennium confronted Copyright system with some serious challenges so that in some cases, protection of creators of digital works and protection of artistic and literary works in digital and cyber space and performance of this works in that space is in doubt. In order to removing this concerns and protection of copyright a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008