Protecting Online Documents from an Unauthorized External Access (in Bulgarian)

نویسنده

  • Yordan Kalmukov
چکیده

The modern multi-tier web applications and information systems store and process various types of data. Some of them are stored in a database, controlled by an external database management system, while other data are stored directly within the server’s file system. The database is secured by the database management system itself, but it is a programmer’s responsibility to design and develop a security protection of the files managed by the information system. This paper summarizes the existing and suggests new rules for design and implementation of an in-depth security protection of file resources, published on the Internet, from an unauthorized external access.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Internet Banking Law: An Iranian Perspective Problems and Prospects of Introducing Islamic Microfinance in Azerbaijan Republic

Bank supervision and monetary policy are strategic concepts in the economy of countries. Development of electronic communications, especially in online and international spheres, has largely threatened financial services in view of security and illegal access to banking networks. Anonymity and identity theft has endangered electronic commerce by crimes like phishing, fraud and different types...

متن کامل

Ma X : An Access Control System for Digital Libraries and the Web

Digital Libraries (DLs) introduce several challenging requirements with respect to the formulation, specification and enforcement of adequate access control policies. Unlike conventional database environments, a DL typically is characterised by a dynamic subject population, often making accesses from remote locations, and by an extraordinarily large amount of information, stored in a variety of...

متن کامل

Activity-oriented access control to ubiquitous hospital information and services

In hospital information systems, protecting the confidentiality of health information, whilst at the same time allowing authorized physicians to access it conveniently, is a crucial requirement. The need to deliver health information at the point-of-care is a primary factor to increase healthcare quality and cost efficiency. However, current systems require considerable coordination effort of h...

متن کامل

Intellectual-Property Protection Opens Path for E-commerce

O ne of the hottest areas of e-commerce is the online sale of music, documents, software, and other forms of intellectual property. To make these efforts successful, however , vendors face a critical concern: how to protect the intellectual property they're trying to sell over the Internet and keep people from copying, forwarding, reselling, or otherwise using it without payment or authorizatio...

متن کامل

مقایسه‌ سطوح دسترسی و محرمانگی مدارک پزشکی در کشورهای منتخب و ایران

Introduction: Undoubtedly, the medical record is one of the most important documents containing the most sensitive information on the public health and treatment. As a matter of fact, protecting the confidentiality of the recorded information and the documents there in should be given top priority. Thus, given the importance of the confidentiality of medical document, and their impact on the be...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1301.1262  شماره 

صفحات  -

تاریخ انتشار 2012