Ivkovic et al., 2012 - Google Patents
A SOLUTION FOR REMOTE PC ACCESS AND MANAGEMENT-RATS-EXTENDED REVIEWIvkovic et al., 2012
- Document ID
- 14414328325083438380
- Author
- Ivkovic M
- Pecev P
- Markoski B
- Ivankovic Z
- Ratgeber L
- Publication year
- Publication venue
- Metalurgia International
External Links
Snippet
This paper presents an alternative solution to remote PC access. management and configuration with a clear goal to eliminate ritch desktop GUI in the process of remote comunication. By doing so, the amount of data excanged between the device that can be …
- 238000000034 method 0 abstract description 30
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/26—Monitoring arrangements; Testing arrangements
- H04L12/2602—Monitoring arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/02—Network-specific arrangements or communication protocols supporting networked applications involving the use of web-based technology, e.g. hyper text transfer protocol [HTTP]
- H04L67/025—Network-specific arrangements or communication protocols supporting networked applications involving the use of web-based technology, e.g. hyper text transfer protocol [HTTP] for remote control or remote monitoring of the application
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
- G06F1/16—Constructional details or arrangements
- G06F1/18—Packaging or power distribution
- G06F1/181—Enclosures
- G06F1/182—Enclosures with special features, e.g. for use in industrial environments; grounding or shielding against radio frequency interference [RFI] or electromagnetical interference [EMI]
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20210326513A1 (en) | Enabling File Attachments in Calendar Events | |
| EP1986096A1 (en) | Streaming a virtual desktop containing several applications for remote display to an authenticated user of a client device | |
| US6438600B1 (en) | Securely sharing log-in credentials among trusted browser-based applications | |
| US8825854B2 (en) | DMZ framework | |
| US20080215675A1 (en) | Method and system for secured syndication of applications and applications' data | |
| EP2771803B1 (en) | File fetch from a remote client device | |
| US20100281528A1 (en) | Methods and systems for generating and delivering an interactive application delivery store | |
| US9398084B2 (en) | Information processing system | |
| KR20090069280A (en) | Computer Controlled Method and Method for Controlling Synchronized Policy in Web Service Environment | |
| SG192018A1 (en) | Strong rights management for computing application functionality | |
| US20170041504A1 (en) | Service providing system, information processing apparatus, program, and method for generating service usage information | |
| WO2005036305A2 (en) | Mobility device | |
| KR100919606B1 (en) | Distributed computing services platform | |
| JP2013058101A (en) | Cloud computing system | |
| Bhatia et al. | Gama: Grid account management architecture | |
| Nwobodo | Cloud computing: Models, services, utility, advantages, security issues, and prototype | |
| Ivkovic et al. | A SOLUTION FOR REMOTE PC ACCESS AND MANAGEMENT-RATS-EXTENDED REVIEW | |
| US10678892B2 (en) | Policy-based mobile access to shared network resources | |
| Kondalwar et al. | Remote administrative trojan/tool (RAT) | |
| Dragoi et al. | Discovering services is not enough | |
| KR20000072758A (en) | clientprogram have user native interface of authentication / security support client / server application for implemented method | |
| Prasad et al. | Identity management on a shoestring | |
| Ismail et al. | REMOTE ADMINISTRATION TOOLS: A COMPARATIVE STUDY. | |
| JP2012137871A (en) | Information processor, information processing method, information processing system, computer program and recording medium | |
| Hernández et al. | WebDAV: what it is, what it does, why you need it |