Secure Enterprise Desktop.
Michael BaentschPaolo ScottonThomas GschwindPublished in: ERCIM News (2012)
Keyphrases
- security management
- personal information management
- knowledge management
- information management
- authentication protocol
- desktop computers
- security issues
- authentication scheme
- information systems
- security analysis
- enterprise architecture
- security level
- electronic business
- desktop search
- data encryption
- data sets
- covert channel
- key management
- security mechanisms
- security requirements
- multi party
- video conferencing
- competitive advantage
- business applications
- personal computer
- mobile devices
- information technology