Nothing Special   »   [go: up one dir, main page]

Strickland et al., 2003 - Google Patents

Patriot in the Library Management Approaches When Demands for Information Are Received from Law Enforcement and Intelligence Agents

Strickland et al., 2003

Document ID
2778974526685304267
Author
Strickland L
Minow M
Lipinski T
Publication year
Publication venue
JC & UL

External Links

Snippet

The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (the" USA PATRIOT Act")'has focused our attention as never before on the expansive world of judicial means by which the government may seek …
Continue reading at heinonline.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action

Similar Documents

Publication Publication Date Title
Dellaportas Conversations with inmate accountants: Motivation, opportunity and the fraud triangle
Sobel The Demeaning of Identity and Personhood in National Indentification Systems
Dempsey et al. Commercial data and national security
Kreimer Watching the watchers: Surveillance, transparency, and political freedom in the war on terror
Ahmed Preventing identity crime: identity theft and identity fraud: an identity crime model and legislative analysis with recommendations for preventing identity crime
Finkin Information Technology and Workers' Privacy: The United States Law
Feinberg Homeland security: implications for information policy and practice—first appraisal
Margulies Searching for federal judicial power: Article III and the foreign intelligence surveillance court
Strickland et al. Patriot in the Library Management Approaches When Demands for Information Are Received from Law Enforcement and Intelligence Agents
Izevbuwa et al. Combating the Menace of Cybercrime in Nigeria: A Review of the Cybercrime (Prohibition, Prevention etc) Act 2015 and Other Legislations
Jackson Considering the creation of a domestic intelligence agency in the United States: Lessons from the experiences of Australia, Canada, France, Germany, and the United Kingdom
Bloom Protecting personal data: A model data security and breach notification statute
Lessambo et al. Anti-money laundering laws
Adarkwah Counter-terrorism framework and individual liberties in Ghana
Haq et al. Digital Forensics in Online Fraud Crimes Investigation
Stevens et al. Privacy: total information awareness programs and related information access, collection, and protection laws
Martorella Libraries in the aftermath of 9/11
Rasor Controlling Government Access to Personal Financial Records
Hillary et al. The Remaining Perils of the Patriot Act: A Primer
Patel et al. A proposal for an NYPD Inspector General
Harper Fusion center privacy policies: does one size fit all?
Hirsch Ballin et al. Counterterrorism measures affecting criminal investigation in the United States
Van Geel Homeland Security Law: A Primer
Kim A Case Study for Response to Terrorist Crimes Related to Identity Theft in Colorado Springs
Novianto COMPARATIVE LEGAL SYSTEM ANALYSIS REGARDING CONSUMER ONLINE DATA PROTECTION IN GERMANY, MALAYSIA AND INDONESIA= COMPARATIVE LEGAL SYSTEM ANALYSIS REGARDING CONSUMER ONLINE DATA PROTECTION IN GERMANY, MALAYSIA AND INDONESIA