Pendam et al., 2024 - Google Patents
QuikAPIs-Automated API Generation and Data Management Platform with Built-in Security.Pendam et al., 2024
- Document ID
- 4259681084972465202
- Author
- Pendam R
- Upadhye M
- Patil N
- Iyer S
- Publication year
- Publication venue
- Journal of Computational Analysis & Applications
External Links
Snippet
The demand for web applications has increased in such a way that efficient and user- friendly solutions for backend development need to be created, especially for less technically inclined people. This paper intends to discuss the design of a novel website …
- 238000013523 data management 0 title description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/22—Manipulating or registering by use of codes, e.g. in sequence of text characters
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogramme communication; Intertask communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30587—Details of specialised database models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/24—Editing, e.g. insert/delete
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/3089—Web site content organization and management, e.g. publishing, automatic linking or maintaining pages
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12261933B2 (en) | Data processing permits system with keys | |
JP5679018B2 (en) | Database encryption system, method and program | |
US9619659B1 (en) | Systems and methods for providing information security using context-based keys | |
JP6048414B2 (en) | Database apparatus, method and program | |
JP5536067B2 (en) | Apparatus, system, method and corresponding software component for encrypting and processing data | |
CN101587479B (en) | Database management system kernel oriented data encryption/decryption system and method thereof | |
US20090178019A1 (en) | System and Method for Multi-Level Security Filtering of Model Representations | |
JP7235668B2 (en) | REGISTRATION METHOD, COMPUTER AND PROGRAM | |
WO2021158274A1 (en) | Method and system for protecting privacy of users in session recordings | |
Ramya Devi et al. | Triple DES: privacy preserving in big data healthcare | |
CN107409040A (en) | For code analysis tool of the recommending data encryption without influenceing Program Semantics | |
US20250150440A1 (en) | Automatically encrypting sensitive data in a distributed microservice framework | |
WO2024238487A1 (en) | Cryptographic cipher for healthcare compliant data transactions | |
US11556839B1 (en) | Auditing system for machine learning decision system | |
CN117397205A (en) | Booting trust for a decentralised identifier | |
Pendam et al. | QuikAPIs-Automated API Generation and Data Management Platform with Built-in Security. | |
Welling | Application Security Testing | |
Pleskach et al. | Mechanisms for Encrypting Big Unstructured Data: Technical and Legal Aspects | |
Sohrabi et al. | Privacy of cloud data using a secure SSO architecture | |
Lammers | Conception of a Security Design Pattern Catalog for Constraint-based Recommender Systems | |
Ji et al. | Research and Practice on the Localisation Adaptation of the Power Enterprise Information System Development Platform Xinchuang (localization) | |
Simou et al. | Review on Privacy and Trust Methodologies in Cloud Computing | |
US11625496B2 (en) | Methods for securing and accessing a digital document | |
Muthukkumarasamy et al. | Information Systems Security | |
Puttaswamy et al. | Silverline: Toward data confidentiality in third-party clouds |