Ahmad et al., 2022 - Google Patents
Cloud security framework and key management services collectively for implementing DLP and IRMAhmad et al., 2022
- Document ID
- 12151808599223928515
- Author
- Ahmad S
- Mehfuz S
- Beg J
- Publication year
- Publication venue
- Materials Today: Proceedings
External Links
Snippet
A free and open-source framework management solution can help organizations as well as end-users. An agentless, completely controlled, centrally administered, and freely distributed source, cloud-based data leak control includes enhanced data loss protection management …
- 230000002265 prevention 0 abstract description 19
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Alouffi et al. | A systematic literature review on cloud computing security: threats and mitigation strategies | |
Borky et al. | Protecting information with cybersecurity | |
Omotunde et al. | A comprehensive review of security measures in database systems: Assessing authentication, access control, and beyond | |
Golightly et al. | Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN | |
Ahmad et al. | Cloud security framework and key management services collectively for implementing DLP and IRM | |
Berry | The importance of cybersecurity in supply chain | |
Morovati et al. | A network based document management model to prevent data extrusion | |
Saranya et al. | Securing the cloud: an empirical study on best practices for ensuring data privacy and protection | |
Sargiotis | Data security and privacy: Protecting sensitive information | |
Abrera | Data Privacy and Security in Cloud Computing: A Comprehensive Review | |
Srikanth et al. | Security issues in cloud and mobile cloud: A comprehensive survey | |
Ahmed et al. | Modeling Security Risk Factors in a Cloud Computing Environment. | |
Shibli et al. | Access control as a service in cloud: challenges, impact and strategies | |
Arogundade | Addressing Cloud Computing Security and Visibility Issues | |
Mandal et al. | Comprehensive Survey of Security Issues & Framework in Data-Centric Cloud Applications. | |
Akhtar et al. | Inter-Cloud Data Security Framework, Compliance And Trust | |
Ramaswamy et al. | Advanced Cybersecurity Strategies in Cloud Computing: Techniques for Data Protection and Privacy. | |
Basson | The right to privacy: how the proposed POPI Bill will impact data security in a Cloud Computing environment | |
Lad | Application and Data Security Patterns | |
Shivakumara et al. | Review Paper on Dynamic Mechanisms of Data Leakage Detection and Prevention | |
Tiwari et al. | Cloud Security Risks, Threats, and Solutions for Business Logistics | |
Al-Dulaimi et al. | Threats in Cloud Computing System and Security Enhancement | |
Haber et al. | Privileged Access Management (PAM) | |
Hussain et al. | Survey on security and privacy of cloud computing paradigm: Challenges and mitigation methods | |
Sahu et al. | MISP: Model for IaaS Security and Privacy |