former_member194219
Explorer
Member since ‎2012 Oct 10

User Statistics

  • 8 Posts
  • 0 Solutions
  • 4 Kudos given
  • 3 Kudos received

User Activity

IntroductionThis article describes one particular scenario in which documents can be encrypted by applying a Digital Rights Management (DRM) solution. Documents that are protected by DRM can only be decrypted by their intended audience. For this purp...
Many SAP applications contain sensitive and confidential data. Examples include personal data, product related data with information concerning intellectual property, and many other data types. Within SAP systems, the access to this information is pr...
Kudos from