Nothing Special   »   [go: up one dir, main page]

Amirah, 2022 - Google Patents

Policy-Based Encryption Models and Their Role in Enforcing Granular Data Security for E-Marketplace Customers

Amirah, 2022

View PDF
Document ID
646977061541215699
Author
Amirah S
Publication year
Publication venue
Perspectives on Next-Generation Cloud Computing Infrastructure and Design Frameworks

External Links

Snippet

Policy-based encryption shapes data security practices in e-marketplaces by binding cryptographic operations to high-level, context-aware policies. E-marketplaces handle diverse customer interactions, ranging from personal information exchanges to transactional …
Continue reading at theaffine.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material

Similar Documents

Publication Publication Date Title
TWI532355B (en) Trustworthy extensible markup language for trustworthy computing and data services
Golightly et al. Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN
AU2024219519A1 (en) Low trust privileged access management
Abbadi A framework for establishing trust in Cloud provenance
Ahmad et al. Cloud security framework and key management services collectively for implementing DLP and IRM
Wulf et al. Information security risks, benefits, and mitigation measures in cloud sourcing
Alboaie et al. Secret smart contracts in hierarchical blockchains
Berlato et al. Formal modelling and automated trade-off analysis of enforcement architectures for cryptographic access control in the cloud
Roy et al. A Study on Google Cloud Platform (GCP) and Its Security
Buecker et al. Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security
Runsewe A policy-based management framework for cloud computing security
Amirah Policy-Based Encryption Models and Their Role in Enforcing Granular Data Security for E-Marketplace Customers
Narayanan Securing hadoop
Colotti Enhancing Multi-cloud Security with Policy as Code and a Cloud Native Application Protection Platform
D'Agostino Data Security in Cloud Computing, Volume I
Haber et al. Privileged Access Management (PAM)
Haber et al. Cloud Definitions
Lad Application and Data Security Patterns
Shengli Towards Secure Blockchain-enabled Cloud Computing: A Taxonomy of Security Issues and Recent Advances
Kolhar et al. Cloud Computing Data Auditing Algorithm
Munir Security model for mobile cloud database as a service (DBaaS)
US20240154968A1 (en) Techniques for unifying multiple identity clouds
US20240154967A1 (en) Techniques for unifying multiple identity clouds
Torres Encryption Key Lifecycle Management and Best Practices for Maintaining Trusted E-Commerce Services in the Cloud
Gunawardena Dynamic Access Control Techniques and Their Role in Preserving Data Confidentiality in Multi-Cloud Retail Solutions