Strickland et al., 2003 - Google Patents
Patriot in the Library Management Approaches When Demands for Information Are Received from Law Enforcement and Intelligence AgentsStrickland et al., 2003
- Document ID
- 2778974526685304267
- Author
- Strickland L
- Minow M
- Lipinski T
- Publication year
- Publication venue
- JC & UL
External Links
Snippet
The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (the" USA PATRIOT Act")'has focused our attention as never before on the expansive world of judicial means by which the government may seek …
- 238000000034 method 0 abstract description 105
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Dellaportas | Conversations with inmate accountants: Motivation, opportunity and the fraud triangle | |
Sobel | The Demeaning of Identity and Personhood in National Indentification Systems | |
Dempsey et al. | Commercial data and national security | |
Kreimer | Watching the watchers: Surveillance, transparency, and political freedom in the war on terror | |
Ahmed | Preventing identity crime: identity theft and identity fraud: an identity crime model and legislative analysis with recommendations for preventing identity crime | |
Finkin | Information Technology and Workers' Privacy: The United States Law | |
Feinberg | Homeland security: implications for information policy and practice—first appraisal | |
Margulies | Searching for federal judicial power: Article III and the foreign intelligence surveillance court | |
Strickland et al. | Patriot in the Library Management Approaches When Demands for Information Are Received from Law Enforcement and Intelligence Agents | |
Izevbuwa et al. | Combating the Menace of Cybercrime in Nigeria: A Review of the Cybercrime (Prohibition, Prevention etc) Act 2015 and Other Legislations | |
Jackson | Considering the creation of a domestic intelligence agency in the United States: Lessons from the experiences of Australia, Canada, France, Germany, and the United Kingdom | |
Bloom | Protecting personal data: A model data security and breach notification statute | |
Lessambo et al. | Anti-money laundering laws | |
Adarkwah | Counter-terrorism framework and individual liberties in Ghana | |
Haq et al. | Digital Forensics in Online Fraud Crimes Investigation | |
Stevens et al. | Privacy: total information awareness programs and related information access, collection, and protection laws | |
Martorella | Libraries in the aftermath of 9/11 | |
Rasor | Controlling Government Access to Personal Financial Records | |
Hillary et al. | The Remaining Perils of the Patriot Act: A Primer | |
Patel et al. | A proposal for an NYPD Inspector General | |
Harper | Fusion center privacy policies: does one size fit all? | |
Hirsch Ballin et al. | Counterterrorism measures affecting criminal investigation in the United States | |
Van Geel | Homeland Security Law: A Primer | |
Kim | A Case Study for Response to Terrorist Crimes Related to Identity Theft in Colorado Springs | |
Novianto | COMPARATIVE LEGAL SYSTEM ANALYSIS REGARDING CONSUMER ONLINE DATA PROTECTION IN GERMANY, MALAYSIA AND INDONESIA= COMPARATIVE LEGAL SYSTEM ANALYSIS REGARDING CONSUMER ONLINE DATA PROTECTION IN GERMANY, MALAYSIA AND INDONESIA |