Please use this identifier to cite or link to this item: https://rfos.fon.bg.ac.rs/handle/123456789/1086
Full metadata record
DC FieldValueLanguage
dc.creatorDamjanović, Boris
dc.creatorSimić, Dejan
dc.date.accessioned2023-05-12T10:38:18Z-
dc.date.available2023-05-12T10:38:18Z-
dc.date.issued2013
dc.identifier.issn1451-4397
dc.identifier.urihttps://rfos.fon.bg.ac.rs/handle/123456789/1086-
dc.description.abstractParalelno sa rastom količine digitalnih informacija koje se smještaju u računarskim sistemima raste i važnost zaštite navedenih podataka. Današnji operativni sistemi nude veliki broj različitih mehanizama za šifrovanje podataka koji često pružaju nejednak nivo zaštite. U ovom tekstu će biti dat pregled osnovnih kriptografskih rješenja zasnovanih na nivou bloka (block based) i na nivou datoteke (file based) koja su se koristila i koja se još koriste u operativnim sistemima zajedno sa prikazom napora za objedinjavanjem kriptografskih API-ja u operativnim sistemima Linux i Windows.sr
dc.description.abstractAlong with the increased amount of digital information that are stored in computer systems increases the importance of protecting this information. Today's operating systems offer a number of different mechanisms to encrypt data that often provide unequal levels of protection. In this paper we provide an overview of basic block based and file based cryptographic solutions that are used in operating systems along with the presentation of efforts to unify cryptographic APIs in Linux and Windows OS.en
dc.publisherUniverzitet u Beogradu - Fakultet organizacionih nauka, Beograd
dc.relationinfo:eu-repo/grantAgreement/MESTD/Technological Development (TD or TR)/32013/RS//
dc.rightsopenAccess
dc.sourceInfo M
dc.subjectoperativni sistemisr
dc.subjectenkripcija podatakasr
dc.subjectbezbjednost i zaštitasr
dc.subjectsecurity and protectionen
dc.subjectoperating systemsen
dc.subjectdata encryptionen
dc.titlePregled primjenjenih pristupa za softversku enkripciju podataka u različitim operativnim sistemimasr
dc.titleA survey of applied approaches for software encryption of data in different operating systemsen
dc.typearticle
dc.rights.licenseARR
dc.citation.epage37
dc.citation.issue47
dc.citation.other12(47): 32-37
dc.citation.rankM52
dc.citation.spage32
dc.citation.volume12
dc.identifier.rcubconv_686
dc.type.versionpublishedVersion
item.cerifentitytypePublications-
item.fulltextNo Fulltext-
item.grantfulltextnone-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.openairetypearticle-
Appears in Collections:Radovi istraživača / Researchers’ publications
Show simple item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.