Nothing Special   »   [go: up one dir, main page]

Ahmad et al., 2022 - Google Patents

Cloud security framework and key management services collectively for implementing DLP and IRM

Ahmad et al., 2022

Document ID
12151808599223928515
Author
Ahmad S
Mehfuz S
Beg J
Publication year
Publication venue
Materials Today: Proceedings

External Links

Snippet

A free and open-source framework management solution can help organizations as well as end-users. An agentless, completely controlled, centrally administered, and freely distributed source, cloud-based data leak control includes enhanced data loss protection management …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems

Similar Documents

Publication Publication Date Title
Alouffi et al. A systematic literature review on cloud computing security: threats and mitigation strategies
Borky et al. Protecting information with cybersecurity
Omotunde et al. A comprehensive review of security measures in database systems: Assessing authentication, access control, and beyond
Golightly et al. Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN
Ahmad et al. Cloud security framework and key management services collectively for implementing DLP and IRM
Berry The importance of cybersecurity in supply chain
Morovati et al. A network based document management model to prevent data extrusion
Saranya et al. Securing the cloud: an empirical study on best practices for ensuring data privacy and protection
Sargiotis Data security and privacy: Protecting sensitive information
Abrera Data Privacy and Security in Cloud Computing: A Comprehensive Review
Srikanth et al. Security issues in cloud and mobile cloud: A comprehensive survey
Ahmed et al. Modeling Security Risk Factors in a Cloud Computing Environment.
Shibli et al. Access control as a service in cloud: challenges, impact and strategies
Arogundade Addressing Cloud Computing Security and Visibility Issues
Mandal et al. Comprehensive Survey of Security Issues & Framework in Data-Centric Cloud Applications.
Akhtar et al. Inter-Cloud Data Security Framework, Compliance And Trust
Ramaswamy et al. Advanced Cybersecurity Strategies in Cloud Computing: Techniques for Data Protection and Privacy.
Basson The right to privacy: how the proposed POPI Bill will impact data security in a Cloud Computing environment
Lad Application and Data Security Patterns
Shivakumara et al. Review Paper on Dynamic Mechanisms of Data Leakage Detection and Prevention
Tiwari et al. Cloud Security Risks, Threats, and Solutions for Business Logistics
Al-Dulaimi et al. Threats in Cloud Computing System and Security Enhancement
Haber et al. Privileged Access Management (PAM)
Hussain et al. Survey on security and privacy of cloud computing paradigm: Challenges and mitigation methods
Sahu et al. MISP: Model for IaaS Security and Privacy