This HTML5 document contains 27 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dcthttp://purl.org/dc/terms/
dbohttp://dbpedia.org/ontology/
foafhttp://xmlns.com/foaf/0.1/
n14https://global.dbpedia.org/id/
dbthttp://dbpedia.org/resource/Template:
rdfshttp://www.w3.org/2000/01/rdf-schema#
freebasehttp://rdf.freebase.com/ns/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
owlhttp://www.w3.org/2002/07/owl#
wikipedia-enhttp://en.wikipedia.org/wiki/
dbphttp://dbpedia.org/property/
dbchttp://dbpedia.org/resource/Category:
provhttp://www.w3.org/ns/prov#
xsdhhttp://www.w3.org/2001/XMLSchema#
wikidatahttp://www.wikidata.org/entity/
dbrhttp://dbpedia.org/resource/

Statements

Subject Item
dbr:Secure_environment
rdfs:label
Secure environment
rdfs:comment
In computing, a secure environment is any system which implements the controlled storage and use of information. In the event of computing data loss, a secure environment is used to protect personal and/or confidential data. Often, secure environments employ cryptography as a means to protect information. Some secure environments employ cryptographic hashing, simply to verify that the information has not been altered since it was last modified.
dct:subject
dbc:Computer_security
dbo:wikiPageID
2989523
dbo:wikiPageRevisionID
1103530123
dbo:wikiPageWikiLink
dbr:Computing dbr:Data_loss dbc:Computer_security dbr:Cryptography dbr:Homomorphic_encryption dbr:Cleanroom dbr:Trusted_computing dbr:Mandatory_access_control dbr:Cryptographic_hash_function dbr:Data_recovery dbr:Computer_data_storage
owl:sameAs
wikidata:Q7444871 n14:4uwjm freebase:m.08j2j8
dbp:wikiPageUsesTemplate
dbt:Unreferenced_stub dbt:Comp-sci-stub
dbp:auto
yes
dbp:date
December 2009
dbo:abstract
In computing, a secure environment is any system which implements the controlled storage and use of information. In the event of computing data loss, a secure environment is used to protect personal and/or confidential data. Often, secure environments employ cryptography as a means to protect information. Some secure environments employ cryptographic hashing, simply to verify that the information has not been altered since it was last modified.
prov:wasDerivedFrom
wikipedia-en:Secure_environment?oldid=1103530123&ns=0
dbo:wikiPageLength
826
foaf:isPrimaryTopicOf
wikipedia-en:Secure_environment