Bronskill et al., 2016 - Google Patents
Your Right to Privacy: Minimize Your Digital FootprintBronskill et al., 2016
- Document ID
- 12084355633325114860
- Author
- Bronskill J
- McKie D
- Publication year
External Links
- 238000005516 engineering process 0 abstract description 34
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Payton et al. | Privacy in the age of Big data: Recognizing threats, defending your rights, and protecting your family | |
Grama | Legal and Privacy Issues in Information Security | |
Schneier | Schneier on security | |
Gray et al. | The right to quantitative privacy | |
Angwin | Dragnet nation: A quest for privacy, security, and freedom in a world of relentless surveillance | |
Gardner et al. | Building an information security awareness program: Defending against social engineering and technical threats | |
Brown | Anonymity, faceprints, and the Constitution | |
Andrejevic et al. | Facial recognition | |
Chertoff | Exploding Data: Reclaiming Our Cyber Security in the Digital Age | |
Baker et al. | Artificial intelligence and the law: Cybercrime and criminal liability | |
Scheer | They know everything about you: How data-collecting corporations and snooping government agencies are destroying democracy | |
Koops | Law, technology, and shifting power relations | |
Camp et al. | The economics of financial and medical identity theft | |
Patel et al. | Social media monitoring | |
Boghosian | " I Have Nothing to Hide": And 20 Other Myths about Surveillance and Privacy | |
Norden | How the internet has changed the face of crime | |
Ringel et al. | Regulating Facial Recognition Technology: A Taxonomy of Regulatory Schemata and First Amendment Challenges | |
Bronskill et al. | Your Right to Privacy: Minimize Your Digital Footprint | |
Levinson-Waldman | What the Government Does with Americans' Data | |
Jackson | Considering the creation of a domestic intelligence agency in the United States: Lessons from the experiences of Australia, Canada, France, Germany, and the United Kingdom | |
Ziccardi et al. | Digital activism, Internet control, transparency, censorship, surveillance and human rights: An international perspective | |
Chasin | The Revolution Will be Tweeted, but the Tweets Will be Subpoenaed: Reimagining Fourth Amendment Privacy to Protect Associational Anonymity | |
AlKaabi | Strategic framework to minimise information security risks in the UAE | |
Koop | LAW, TECHNOLOGY, AND SHIFTING POWER RELATIONS. | |
Dixon | Surveillance in America: An Encyclopedia of History, Politics, and the Law [2 volumes] |