Nothing Special   »   [go: up one dir, main page]

Kaur et al., 2022 - Google Patents

Pre-requisite Concepts for Security and Privacy

Kaur et al., 2022

Document ID
15568066457231904279
Author
Kaur I
Bharti S
Saxena S
Publication year
Publication venue
Internet of Things: Security and Privacy in Cyberspace

External Links

Snippet

Nowadays, technology has reached a level that it is dissolved in our lives. Expanding rapidly in the last several decades, information security has become a major concern for everyone connected to the Internet. Information security ensures that our information is only available …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators

Similar Documents

Publication Publication Date Title
Bhatia et al. Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues
Sumitra et al. A survey of cloud authentication attacks and solution approaches
CN109361668A (en) A kind of data trusted transmission method
Alhothaily et al. A secure and practical authentication scheme using personal devices
Kumar et al. A survey on secure cloud: security and privacy in cloud computing
Agarwal et al. A survey on cloud computing security issues and cryptographic techniques
Dubey et al. Cyber security model to secure data transmission using cloud cryptography
Alzuwaini et al. An Efficient Mechanism to Prevent the Phishing Attacks.
Chidambaram et al. Enhancing the security of customer data in cloud environments using a novel digital fingerprinting technique
CN114826702B (en) Database access password encryption method and device and computer equipment
Kushwaha et al. A brief survey of challenge–response authentication mechanisms
Junghanns et al. Engineering of secure multi-cloud storage
Sehgal et al. Cloud computing and information security
CN110572392A (en) Identity authentication method based on HyperLegger network
Williams et al. Security aspects of internet of things–a survey
Blaze Key escrow from a safe distance: looking back at the clipper chip
Achary Cryptography and Network Security: An Introduction
Kaur et al. Pre-requisite Concepts for Security and Privacy
Geetha et al. Introduction To Cryptography And Network Security
Kankal et al. An adaptive authentication based on blockchain for bigdata hadoop framework
Patel A survey on security techniques used for confidentiality in cloud computing
Kanaga Priya et al. Various Attacks on the Implementation of Cryptographic Algorithms
Aldweesh Enhancing Metaverse Security with Block Chain Authentication: Methods and Analysis
Gagged et al. Improved secure dynamic bit standard technique for a private cloud platform to address security challenges
Attia et al. E-mail systems in cloud computing environment privacy, trust and security challenges