LivCosEverything about the LivCos
project. ImagesHow to best handle image/picture resources via the Web interface. Data SharingData sharing and versioning using existing technologies and tools. Namespace URIsRFC 3986 - Uniform Resource Identifier (URI): Generic SyntaxEach URI begins with a scheme name that refers to a specification for assigning identifiers within that scheme. | |
| Access Security | Access LogUse a hash of the access log as an additional kind of password. The access log (Computer/Access Time/Access ID) is known to the client and the server. Intruders would need to listen and record the communication from the beginning. | (Re)Starting LogAn access log needs to start at some time. It can also get lost on the client or the server. Random Access IDA random access ID could be securly transmitted between the client and the server. An external listener would have more difficulties to record the access log. Log Not MatchingThere is an access log available, on the client and the server, but they don't match. Lock AccessThe access can be locked manually by the user or automatically, when the access logs of the client and the server don't match. |
|