GCC Teaching: 052445 LOG eSpace Concepts 1. LOG of the course, Groupware Competence Center, Paderborn 2002.

Log of the course eSpace Concepts 1

THEMES: GCC Teaching\Lecture 2002/0...
META STRUCTURES: GCC Activities\...\Lectures | GCC Teaching\Lecture 2002/0... | IE\Vorlesungen | Projects\...\Lectures | Projects\...\Lectures
YEAR: 2002
Login Login
User: Anonymous


PLACES: Paderborn
TIME: 2002
 
13.01.
Covered Topics
Security Architectures in eSpaces 3

Security architecture of a domino environment
  • Mail based distribution of Secret Encryption Keys
  • Database 'GCC K-Pool', View '1.0.1 All Authors (Intranet)', Document 'Article: Notes Encryption - Locks for a digital world' Article: Notes Encryption - Locks for a digital world

Document Security
Document based Security Model in PAVONE Enterprise Office

Security on the Notes Client
Database 'GCC K-Pool', View '1.0.1 All Authors (Intranet)', Document 'How Restricting execution access  ' The Execution Control List (ECL)
Database 'GCC K-Pool', View '1.0.1 All Authors (Intranet)', Document 'Article: Staying alert with execution control lists' Article: Staying alert with execution control lists

Additional Readings:
Database 'GCC K-Pool', View '1.0.1 All Authors (Intranet)', Document 'Magazine: Iris Today, Special Security Issue' Magazine: Iris Today, Special Security Issue
Database 'GCC K-Pool', View '1.0.1 All Authors (Intranet)', Document 'Article: Milestones in Notes/Domino Security Architecture since Release 1' Article: Milestones in Notes/Domino Security Architecture since Release 1
Database 'GCC K-Pool', View '1.0.1 All Authors (Intranet)', Document 'Article: Overview of Notes/Domino Security' Article: Overview of Notes/Domino Security
Database 'GCC K-Pool', View '1.0.1 All Authors (Intranet)', Document 'Article: Using Field Encryption in Notes Applications' Article: Using Field Encryption in Notes Applications

Internal Links:
Database 'GCC-IM Library & Materialien', View '5.1 Berichte - Gliederung', Document 'SECURITY: Sicherheit in Dokumenten- und Workflow-Management-Systemen' GCC Scurity Roadmap