Nothing Special   »   [go: up one dir, main page]

Bronskill et al., 2016 - Google Patents

Your Right to Privacy: Minimize Your Digital Footprint

Bronskill et al., 2016

Document ID
12084355633325114860
Author
Bronskill J
McKie D
Publication year

External Links

Continue reading at scholar.google.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Similar Documents

Publication Publication Date Title
Payton et al. Privacy in the age of Big data: Recognizing threats, defending your rights, and protecting your family
Grama Legal and Privacy Issues in Information Security
Schneier Schneier on security
Gray et al. The right to quantitative privacy
Angwin Dragnet nation: A quest for privacy, security, and freedom in a world of relentless surveillance
Gardner et al. Building an information security awareness program: Defending against social engineering and technical threats
Brown Anonymity, faceprints, and the Constitution
Andrejevic et al. Facial recognition
Chertoff Exploding Data: Reclaiming Our Cyber Security in the Digital Age
Baker et al. Artificial intelligence and the law: Cybercrime and criminal liability
Scheer They know everything about you: How data-collecting corporations and snooping government agencies are destroying democracy
Koops Law, technology, and shifting power relations
Camp et al. The economics of financial and medical identity theft
Patel et al. Social media monitoring
Boghosian " I Have Nothing to Hide": And 20 Other Myths about Surveillance and Privacy
Norden How the internet has changed the face of crime
Ringel et al. Regulating Facial Recognition Technology: A Taxonomy of Regulatory Schemata and First Amendment Challenges
Bronskill et al. Your Right to Privacy: Minimize Your Digital Footprint
Levinson-Waldman What the Government Does with Americans' Data
Jackson Considering the creation of a domestic intelligence agency in the United States: Lessons from the experiences of Australia, Canada, France, Germany, and the United Kingdom
Ziccardi et al. Digital activism, Internet control, transparency, censorship, surveillance and human rights: An international perspective
Chasin The Revolution Will be Tweeted, but the Tweets Will be Subpoenaed: Reimagining Fourth Amendment Privacy to Protect Associational Anonymity
AlKaabi Strategic framework to minimise information security risks in the UAE
Koop LAW, TECHNOLOGY, AND SHIFTING POWER RELATIONS.
Dixon Surveillance in America: An Encyclopedia of History, Politics, and the Law [2 volumes]