Secure Printing of Confidential Documents for Nomadic Users
نویسندگان
چکیده
In an economic environment more global each day, a high percent of the employees in a company spend the most part of their work time outside their offices or even outside their countries. Advances in portable devices design and arrival of communication networks capable to transmitting such data allow these nomadic employees to fulfil their tasks with the only help of a mobile phone or a PDA. However, these devices show lacks when accessing large size files, which sometimes can be needed when it is to present a report or formalize a contract at a client's head office. This problem worsens if the document contains confidential data and it cannot be hosted in an accessible server in the company nor can be sent by fax without putting its security at risk. In this paper we present a system which allows nomadic employees, using a light portable device and a secure communication channel with their company, after a search of the required document and its finding through short metadata, appropriate for being shown in the screen of this kind of devices, such as title, date and document relevant phrases, being able to request remote printing and ciphered reception with one-time key, through an open channel and for a wide range of multifunction printers supporting J2ME, avoiding the risk for the above-mentioned document to get lost.
منابع مشابه
Efficient Multi-User Indexing for Secure Keyword Search
Secure keyword search in shared infrastructures prevents stored documents from leaking confidential information to unauthorized users. We assume that a shared index provides confidentiality if it can only be used by users authorized to search all the documents contained in the index. We introduce the Lethe indexing workflow to improve query and update efficiency in secure keyword search. Lethe ...
متن کاملA zero-stop authentication system for sensor-based embedded real-time applications
This paper proposes “Zero-stop Authentication” model and system, which realizes automatic, real-time authentication in the physical world. Applications in the physical environment such as those at library gates and supermarket counters could benefit from automatic authentication of users. These applications need to detect users using embedded sensors, and authenticate them, and bind objects to ...
متن کاملA Web-based Secure System for the Distributed Printing of Documents and Images
We propose and consider a secure printing system for the distributed printing of documents and images over the World Wide Web. This system enables secure sharing, commerce, and collaboration using images and documents. The main feature of the system is that it allows a user authorized through an authentication mechanism to preview and print selected documents and images. The user can then print...
متن کاملSecure Searchable Based Asymmetric Encryption in Cloud Computing
Cloud computing offers a wide range of services such as user demand network, operating systems, hardware, software and resources. These encouraging facilities and hassle free management of computing resources have attracted many users to outsource their data to untrusted servers. Cloud server may leak documents to unauthorized parties. Therefore, all documents need to be transmitted in cipherte...
متن کاملPrivatePond: Outsourced Management of Web Corpuses
With the rise of cloud computing, it is increasingly attractive for end-users (organizations and individuals) to outsource the management of their data to a small number of largescale service providers. In this paper, we consider a user who wants to outsource storage and search for a corpus of web documents (e.g., an intranet). At the same time, the corpus may contain confidential documents tha...
متن کامل