Wei et al., 1999 - Google Patents
Session management for web-based healthcare applications.Wei et al., 1999
View PDF- Document ID
- 13000598472039783562
- Author
- Wei L
- Sengupta S
- Publication year
- Publication venue
- Proceedings of the AMIA Symposium
External Links
Snippet
In health care systems, users may access multiple applications during one session of interaction with the system. However, users must sign on to each application individually, and it is difficult to maintain a common context among these applications. We are developing …
- 230000003993 interaction 0 abstract description 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11501057B2 (en) | Enabling file attachments in calendar events | |
US8935418B2 (en) | Access system interface | |
US7676675B2 (en) | Architecture for connecting a remote client to a local client desktop | |
US6986039B1 (en) | Technique for synchronizing security credentials using a trusted authenticating domain | |
US7231661B1 (en) | Authorization services with external authentication | |
US7356833B2 (en) | Systems and methods for authenticating a user to a web server | |
US7814536B2 (en) | User authentication | |
US7249369B2 (en) | Post data processing | |
US6144959A (en) | System and method for managing user accounts in a communication network | |
US7080077B2 (en) | Localized access | |
US7134137B2 (en) | Providing data to applications from an access system | |
US8661539B2 (en) | Intrusion threat detection | |
EP2520064B1 (en) | Distributed authentication with data cloud | |
US7296077B2 (en) | Method and system for web-based switch-user operation | |
US6986038B1 (en) | Technique for synchronizing security credentials from a master directory, platform, or registry | |
US20030177388A1 (en) | Authenticated identity translation within a multiple computing unit environment | |
US20030084104A1 (en) | System and method for remote storage and retrieval of data | |
US9053342B2 (en) | Multi-identity for secure file sharing | |
WO2002005185A1 (en) | Query string processing | |
GB2373418A (en) | Method and system to provide and manage secure access to internal computer systems from an external client | |
WO2005036304A2 (en) | Mobility device server | |
CN109165500A (en) | A kind of single sign-on authentication system and method based on cross-domain technology | |
US7636852B1 (en) | Call center dashboard | |
JP2002189646A (en) | Repeating installation | |
Wei et al. | Session management for web-based healthcare applications. |