Access the full text.
Sign up today, get DeepDyve free for 14 days.
T.B Passin
Data interchange using Web sites
N. Maxemchuk, S. Low (1997)
Marking text documentsProceedings of International Conference on Image Processing, 3
A. Lioy, F. Maino, M. Mezzalama (1997)
Secure document management and distribution in an open network environment
B Preneel
ESAT, SOFSEM ’98: Proc. Theory and Practice of Informatics
J. Ashford (1987)
Information structures for office automation
N Alon, Z Galil, M Yung
Efficient dynamically‐resharing ‘verifiable secret sharing’ against mobile adversary
S. Gritzalis, G. Aggelis, D. Spinellis (1999)
Architectures for secure portable executable contentInternet Res., 9
P. Wong, D. Tretter, T. Kite, Qian Lin, H. Nguyen (1998)
A Web-based secure system for the distributed printing of documents and imagesProceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269)
S. Foo, P. Leong, S. Hui, Shigong Liu (1999)
Security considerations in the delivery of Web-based applications: a case studyInf. Manag. Comput. Secur., 7
S. Daniels (1997)
Making e‐mail secureWork Study, 46
R. Gove (1997)
An Overview of Modern CryptographyInf. Secur. J. A Glob. Perspect., 6
Akira Maeda, Myriam Dartois, Takehisa Fujita, T. Sakaguchi, S. Sugimoto, K. Tabata (1998)
Viewing multilingual documents on your local Web browserCommun. ACM, 41
J. Bosak, T. Bray (1999)
XML and the Second-Generation WEBScientific American, 280
There is a need today for active documents on a global network which can react to their environment. The documents should be able to deal with all issues of presentation, interpretation and security. They should be capable of presenting information in a way suitable for a particular user or situation and be capable of presenting alternate information depending upon the environment it is used in. The document should be capable of providing, in a stand-alone situation, as much security as is required of that situation. This paper proposes a paradigm for such documents and suggests ways the documents could be structured.
Information Management & Computer Security – Emerald Publishing
Published: Dec 1, 2000
Keywords: Security; Documents
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.