메뉴 건너뛰기




Volumn , Issue , 2009, Pages 839-841

A model of information security based on office automation

Author keywords

Classifying; Cryptoapi; Document; Model; Office automation; Secure

Indexed keywords

CLASSIFYING; DOCUMENT MANAGEMENT; DOCUMENT MODEL; ENCRYPTED ALGORITHMS; EXPERIMENTAL PROTOTYPE; INFORMATION SECURITY; KEY TECHNOLOGIES;

EID: 73549089499     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NCM.2009.67     Document Type: Conference Paper
Times cited : (5)

References (8)
  • 1
    • 35148855065 scopus 로고    scopus 로고
    • A Modified Model for Private Data Security Facing E-commerce
    • Chunyong Yin, Jianshi Li, Ruxia Sun. A Modified Model for Private Data Security Facing E-commerce. SNPD (3) 2007: 762-765.
    • (2007) SNPD , vol.3 , pp. 762-765
    • Yin, C.1    Li, J.2    Sun, R.3
  • 3
    • 70350586356 scopus 로고    scopus 로고
    • Storage and Query over Encrypted String Based on Commercial Database Management System
    • Wang Zheng-fei, WANG Wei, SHI Bai-le. Storage and Query over Encrypted String Based on Commercial Database Management System. Journal of Chinese Computer Systems, 2005, 26(11): 1933-1937.
    • (2005) Journal of Chinese Computer Systems , vol.26 , Issue.11 , pp. 1933-1937
    • Wang, Z.-F.1    Wei, W.A.N.G.2    Bai-le, S.H.I.3
  • 4
    • 0018031808 scopus 로고    scopus 로고
    • Dromey R. Geoff. Compact and efficient file structure for searching large generic-keyed databases. An application to mass spectral data .Journal of Chemical Information and Computer Sciences, v 18, n 4, Nov, 1978, p 222-225
    • Dromey R. Geoff. Compact and efficient file structure for searching large generic-keyed databases. An application to mass spectral data .Journal of Chemical Information and Computer Sciences, v 18, n 4, Nov, 1978, p 222-225
  • 5
    • 33244469997 scopus 로고    scopus 로고
    • Damiani, Ernesto; Jajodia, Sushil; De Capitani Di Vimercati, S.; Paraboschi, Stefano; Foresti, Sara; Samarati, Pierangela. Key management for multi-user encrypted databases. Proceedings of the 2005 ACM Workshop on Storage Security and Survivability,2005, p74-83
    • Damiani, Ernesto; Jajodia, Sushil; De Capitani Di Vimercati, S.; Paraboschi, Stefano; Foresti, Sara; Samarati, Pierangela. Key management for multi-user encrypted databases. Proceedings of the 2005 ACM Workshop on Storage Security and Survivability,2005, p74-83
  • 6
    • 0026677923 scopus 로고    scopus 로고
    • Ozsoyoglu, Z. Meral; Wang, Jian. A keying method for a nested relational database management system.Proceedings - International Conference on Data Engineering, Jan, 1992, p 438-446
    • Ozsoyoglu, Z. Meral; Wang, Jian. A keying method for a nested relational database management system.Proceedings - International Conference on Data Engineering, Jan, 1992, p 438-446
  • 8
    • 33747674301 scopus 로고    scopus 로고
    • Freire-Santos, M.; Fierrez-Aguilar, J.; Ortega-Garcia, J. Cryptographic key generation using handwritten signature. Proceedings of SPIE - The International Society for Optical Engineering, v 6202, Biometric Technology for Human Identification III, 2006.
    • Freire-Santos, M.; Fierrez-Aguilar, J.; Ortega-Garcia, J. Cryptographic key generation using handwritten signature. Proceedings of SPIE - The International Society for Optical Engineering, v 6202, Biometric Technology for Human Identification III, 2006.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.