Article Fingerprint
ReserarchID
Q92Y0
At present days, technology growth was rapid and its use is very often. So the attacks were concentrated on the user systems mainly by using the network applications. Bugs in the application of a network can ruin the applications in a system that are running. When the user is in the use of internet or e-commerce sites, etc.., the applications will be considered that they are in an unsafe environment. Providing security to the network applications like web servers, mails, etc… Is very difficult because they are usually very big applications to make them free from bugs. Now this paper describes how to provide security to the network applications which are in unsafe environment. This idea describes that all the applications were wrapped together for the security purpose and there will be no use to rewrite the network applications.
Terva Jahnavi. 2015. \u201cSecurity in Untrusted Updated Environments\u201d. Global Journal of Research in Engineering - J: General Engineering GJRE-J Volume 15 (GJRE Volume 15 Issue J3): .
Crossref Journal DOI 10.17406/gjre
Print ISSN 0975-5861
e-ISSN 2249-4596
Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.
Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.
Total Score: 103
Country: India
Subject: Global Journal of Research in Engineering - J: General Engineering
Authors: Terva Jahnavi, K.Jaya Krishna, K.Kondaiah (PhD/Dr. count: 0)
View Count (all-time): 238
Total Views (Real + Logic): 4378
Total Downloads (simulated): 2027
Publish Date: 2015 05, Fri
Monthly Totals (Real + Logic):
This paper attempted to assess the attitudes of students in
Advances in technology have created the potential for a new
Inclusion has become a priority on the global educational agenda,
At present days, technology growth was rapid and its use is very often. So the attacks were concentrated on the user systems mainly by using the network applications. Bugs in the application of a network can ruin the applications in a system that are running. When the user is in the use of internet or e-commerce sites, etc.., the applications will be considered that they are in an unsafe environment. Providing security to the network applications like web servers, mails, etc… Is very difficult because they are usually very big applications to make them free from bugs. Now this paper describes how to provide security to the network applications which are in unsafe environment. This idea describes that all the applications were wrapped together for the security purpose and there will be no use to rewrite the network applications.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.