Kaur et al., 2022 - Google Patents
Pre-requisite Concepts for Security and PrivacyKaur et al., 2022
- Document ID
- 15568066457231904279
- Author
- Kaur I
- Bharti S
- Saxena S
- Publication year
- Publication venue
- Internet of Things: Security and Privacy in Cyberspace
External Links
Snippet
Nowadays, technology has reached a level that it is dissolved in our lives. Expanding rapidly in the last several decades, information security has become a major concern for everyone connected to the Internet. Information security ensures that our information is only available …
- 238000000034 method 0 abstract description 23
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bhatia et al. | Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues | |
Sumitra et al. | A survey of cloud authentication attacks and solution approaches | |
CN109361668A (en) | A kind of data trusted transmission method | |
Alhothaily et al. | A secure and practical authentication scheme using personal devices | |
Kumar et al. | A survey on secure cloud: security and privacy in cloud computing | |
Agarwal et al. | A survey on cloud computing security issues and cryptographic techniques | |
Dubey et al. | Cyber security model to secure data transmission using cloud cryptography | |
Alzuwaini et al. | An Efficient Mechanism to Prevent the Phishing Attacks. | |
Chidambaram et al. | Enhancing the security of customer data in cloud environments using a novel digital fingerprinting technique | |
CN114826702B (en) | Database access password encryption method and device and computer equipment | |
Kushwaha et al. | A brief survey of challenge–response authentication mechanisms | |
Junghanns et al. | Engineering of secure multi-cloud storage | |
Sehgal et al. | Cloud computing and information security | |
CN110572392A (en) | Identity authentication method based on HyperLegger network | |
Williams et al. | Security aspects of internet of things–a survey | |
Blaze | Key escrow from a safe distance: looking back at the clipper chip | |
Achary | Cryptography and Network Security: An Introduction | |
Kaur et al. | Pre-requisite Concepts for Security and Privacy | |
Geetha et al. | Introduction To Cryptography And Network Security | |
Kankal et al. | An adaptive authentication based on blockchain for bigdata hadoop framework | |
Patel | A survey on security techniques used for confidentiality in cloud computing | |
Kanaga Priya et al. | Various Attacks on the Implementation of Cryptographic Algorithms | |
Aldweesh | Enhancing Metaverse Security with Block Chain Authentication: Methods and Analysis | |
Gagged et al. | Improved secure dynamic bit standard technique for a private cloud platform to address security challenges | |
Attia et al. | E-mail systems in cloud computing environment privacy, trust and security challenges |