Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

ElementDescription
Authentication and access control Configuring user permissions
Protected exportDigital signature verification

Object masking

MaskingBased Privacy Masking

Automatic system responses in the event of inactivity or integrity violations

Encrypting and hiding private information in the archive

Technical protection of informationÂ