z-logo
open-access-imgOpen Access
Implementation of the Security Architecture in Power Point System
Author(s) -
Seung Ju Jang
Publication year - 2019
Publication title -
european journal of engineering research and science
Language(s) - English
Resource type - Journals
ISSN - 2506-8016
DOI - 10.24018/ejers.2019.4.9.1491
Subject(s) - architecture , computer science , block (permutation group theory) , authentication (law) , point (geometry) , distributed system security architecture , key (lock) , enterprise information security architecture , systems architecture , computer security , power (physics) , embedded system , operating system , cloud computing security , security information and event management , geometry , mathematics , cloud computing , art , physics , quantum mechanics , visual arts
I implement the security architecture in power point system. I analyze the power point system structure. And this paper proposes the security architecture for the power point system. In order to block the main data access, it judges whether or not access is possible through user authentication from the server. If you are an accessible user, you can use PowerPoint's key data separately. This architecture gives the safe use of PowerPoint system. The design contents proposed in this paper are actually implemented and tested. As a result of the experiment on the design contents of this paper, it can be confirmed that the operation is normal.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here