Volume- 5
Issue- 2
Year- 2018
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Prabhu S , Pavithran A , Raghul N , Raja Gopal C
As a continually developing monetary administration of electronic trade, web managing an account requires the advancement and usage of a sound security method. Salesforce is a cloud supplier that gives security and one of its primary administrations is that it actualizes security plan to fulfill any organization. One of the most imperative test of the salesforce is to ensure the information amid exchanges. This administration guarantees to give the most productive and safe occupations in the greater part of the keeping money frameworks, it likewise executes security controls that you think they are proper for the affectability of your information. This task will bolster us to shield the information from an unapproved client who tries to access from outside your organization and furthermore ensures that exclusive an honest to goodness client has the entrance control.
[1]”E-Commerce Security Issues”, Randy C. Marchany Virginia Tech Computing Center Blacksburg, VA USA 24061 marchany@vt.edu ,Joseph G. Tront Electrical & Computer Engineering Virginia Tech Blacksburg, VA 24061-0111 jgtront@vt.edu
[2]Cloud Computing: Security Issues and Research Challenges”, Rabi Prasad Padhy1 Senior Software Engineer Oracle India Pvt. ltd. Bangalore, India ManasRanjan Patra2 Associate Professor Dept. of Computer Science Berhampur University, IndiaSuresh Chandra Satapathy3 HOD & Professor Dept. of Computer Science & Engineering ANITS, Sanivasala, India
[3]Android Security: A Survey of Issues, Malware Penetration, and DefensesParvezFaruki, AmmarBharmal, Vijay Laxmi, Vijay Ganmoor, Manoj Singh Gaur, Mauro Conti, Senior Member, IEEE, and MuttukrishnanRajarajan
[4]Transaction Security SystemD. G. Abraham G. M. Dolan G. P. Double J. V. Stevens
[5]”Information security and privacy in healthcare: current state of research”,AjitAppari and M. Eric Johnson* Glassmeyer/McNamee Center for Digital Strategies, Tuck School of Business, Dartmouth College, Hanover, NH 03755, USA E-mail: Ajit.Appari@Tuck.Dartmouth.Edu E-mail: M.Eric.Johnson@Tuck.Dartmouth.Edu
[6]“A Virtual Machine-Based Platform for Trusted Computing”, Tal Garfinkel Ben Pfaff Jim Chow Mendel Rosenblum Dan Boneh {talg,blp,jchow,mendel,dabo}@cs.stanford.edu Computer Science Department, Stanford University
[7]”A Security Model For Aglets”,Günter Karjoth IBM Research Division, Zurich Research Laboratory DANNY B. LANGE† AND MITSURU OSHIMA IBM Research Division, Tokyo Research Laboratory
[8]Method For Security Implementation In Computer System’s Software Primary Examiner—Robert W. Beausoliel, Jr. Assistant Examiner—Norman Michael Wright Attorney, Agent, or Firm—Jeffrey A. HallInventor: Vincent Hsieh, Cupertino, Calif. Assignee: Memc0 Software, Ltd., New York.
[9]“Method And Apparatus For End-To-End Secure Data Communication “,Jayant Shukla, Sierra Madre, CA (US)
[10]“Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks”,SENCUN ZHU the Pennsylvania State University and SANJEEV SETIA and SUSHIL JAJODIA George Mason University
Assistant Professor Department of Computer Science and Engineering S.A. Engineering College, Chennai, India
No. of Downloads: 16 | No. of Views: 857
Preet Bhutani, Chandra Sekhar Dash.
August 2024 - Vol 11, Issue 4
Tushar Maurya, Saurav Kumar Singh, Vikram Thakur, Sachin Chawla.
June 2024 - Vol 11, Issue 3
Sangeeta Devi, Munish Saran, Rajan Kumar Yadav, Pranjal Maurya, Upendra Nath Tripathi.
June 2024 - Vol 11, Issue 3