Secure Printing of Confidential Documents for Nomadic Users.

作者: Ramiro Cano , Luis Bengochea

DOI:

关键词:

摘要: In an economic environment more global each day, a high percent of the employees in company spend most part their work time outside offices or even countries. Advances portable devices design and arrival communication networks capable to transmitting such data allow these nomadic fulfil tasks with only help mobile phone PDA. However, show lacks when accessing large size files, which sometimes can be needed it is present report formalize contract at client's head office. This problem worsens if document contains confidential cannot hosted accessible server nor sent by fax without putting its security risk. this paper we system allows employees, using light device secure channel company, after search required finding through short metadata, appropriate for being shown screen kind devices, as title, date relevant phrases, able request remote printing ciphered reception one-time key, open wide range multifunction printers supporting J2ME, avoiding risk above-mentioned get lost.

参考文章(11)
Pieter Retief Kasselman, Analysis and design of cryptographic hash functions University of Pretoria. ,(1999)
S. Kamouskos, Supporting nomadic users within virtual private networks global communications conference. pp. 128- 133 ,(2000) , 10.1109/SPVCE.2000.934172
L. Kleinrock, Nomadic computing and smart spaces IEEE Internet Computing. ,vol. 4, pp. 52- 53 ,(2000) , 10.1109/4236.815852
R. L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems Communications of the ACM. ,vol. 26, pp. 96- 99 ,(1983) , 10.1145/357980.358017
Shaleen Deo, Steve Jones, Matt Jones, Using keyphrases as search result surrogates on small screen devices ubiquitous computing. ,vol. 8, pp. 55- 68 ,(2004) , 10.1007/S00779-004-0258-Y
Orkut Buyukkokten, Hector Garcia-Molina, Andreas Paepcke, Seeing the whole in parts Proceedings of the tenth international conference on World Wide Web - WWW '01. pp. 652- 662 ,(2001) , 10.1145/371920.372178
L. Kleinrock, On some principles of nomadic computing and multi-access communications IEEE Communications Magazine. ,vol. 38, pp. 46- 50 ,(2000) , 10.1109/35.852030
A. Ranganathan, S. Chetan, R. Campbell, Mobile polymorphic applications in ubiquitous computing environments international conference on mobile and ubiquitous systems: networking and services. pp. 402- 411 ,(2004) , 10.1109/MOBIQ.2004.1331747
Peter Gutmann, Secure deletion of data from magnetic and solid-state memory usenix security symposium. pp. 8- 8 ,(1996)