Security for mailing Applications
#1

Security for mailing Applications

Security plays a major role in the software world. All our confidential and important documents need to be secure. The primary object of our project is to develop a security provider for the mailing applications.

CRYTOGRAPHY is the tool which is used in our project. We are using Java platform for it’s in built security feature and usages in the network communications.

Nowadays Internet has become unsecured as there are lots of malicious programs written by some twisty people which may contain Trojan horse, virus/worms and not fully secured. Java consists of sand box security which ensures that entrusted entries are not allowed with limited access and capabilities at end users machines. The sandbox is responsible for protecting a number of resources, and it does so at a number of levels. The user’s machine has access to many things:
§ Internally, it has access to its local memory.
§ Externally, it has access to its file system and to other machines on LAN.
§ For running applets, it has access to a web server, which may be on its local net or may be on the Internet
§ Data flows through this entire model, from the user’s machines through the network and to disk.

Each of these resources need to be protected and those protection from the basis of Java’s security model. Our security provider has features which will make us to download or use only trusted and reliable applications and in this way it safeguards the system.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Cloud Computing with Service Oriented Architecture in Business Applications 1 909 15-02-2017, 11:55 AM
Last Post: jaseela123d
  Migrating Component-based Web Applications to Web Services: towards considering a ”We 1 844 15-02-2017, 10:56 AM
Last Post: jaseela123d
  Cloud Computing Security: From Single to Multi-Clouds 1 832 14-02-2017, 04:56 PM
Last Post: jaseela123d
  Security Analysis of the SASI Protocol computer science topics 2 1,961 21-06-2016, 10:30 PM
Last Post: Guest
  Security system using IP camera mechanical engineering crazy 5 4,378 16-03-2015, 02:52 PM
Last Post: seminar report asees
  Fault Secure Encoder and Decoder For NanoMemory Applications computer girl 2 2,929 25-02-2015, 07:17 AM
Last Post: Guest
  A PROACTIVE APPROACH TO NETWORK SECURITY nit_cal 1 2,268 19-09-2014, 12:52 AM
Last Post: [email protected]
  Data Security Using Honey Pot System computer science topics 5 6,707 11-09-2014, 07:45 PM
Last Post: erhhk
  Folder Security System computer science topics 6 3,674 29-07-2013, 11:09 AM
Last Post: computer topic
  Internet Security and Firewall Design smart paper boy 1 1,862 10-12-2012, 01:23 PM
Last Post: seminar details

Forum Jump: