[go: up one dir, main page]

Upadhyaya et al., 2022 - Google Patents

A Novel Method for Trusted Audit and Compliance for Network Devices by Using Blockchain

Upadhyaya et al., 2022

Document ID
5262576963768222664
Author
Upadhyaya S
Thangaraju B
Publication year
Publication venue
2022 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)

External Links

Snippet

The Network Security and Risk (NSR) management team in an enterprise is responsible for maintaining the network which includes switches, routers, firewalls, controllers, etc. Due to the ever-increasing threat of capitalizing on the vulnerabilities to create cyber-attacks across …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Similar Documents

Publication Publication Date Title
US8434129B2 (en) Method and apparatus for multi-domain identity interoperability and compliance verification
Paxson et al. Experiences with NIMI
CN110598446A (en) Block chain based test method and device, storage medium and computer equipment
US20150347751A1 (en) System and method for monitoring data in a client environment
Serketzis et al. Actionable threat intelligence for digital forensics readiness
CN111694743A (en) Service system detection method and device
CN116583833A (en) Self-Auditing Blockchain
Berbecaru et al. An evaluation of X. 509 certificate revocation and related privacy issues in the web PKI ecosystem
CN112132554A (en) A government information processing method, device, electronic device and storage medium
US20200364192A1 (en) Efficient and automatic database patching using elevated privileges
Basney et al. Investigating root causes of authentication failures using a saml and oidc observatory
US20250225059A1 (en) Generating Test Data Based On Actual Usage Data
Upadhyaya et al. A Novel Method for Trusted Audit and Compliance for Network Devices by Using Blockchain
Bilar Quantitative risk analysis of computer networks
Takahashi et al. Structured cybersecurity information exchange for streamlining incident response operations
Hai et al. Evaluating the security levels of the Web-Portals based on the standard ISO/IEC 15408
Aslam et al. ASArP: automated security assessment & audit of remote platforms using TCG-SCAP synergies
Alqahtani A novel approach to providing secure data storage using multi cloud computing
Heed et al. Deliverable D8. 6 Vulnerability Assessment as a Service Pilot Project
Pritz Shell activity logging and auditing in exercise environments of security Lectures using OSS
Moreno Ribot Assessing modern web applications security
Bufalino et al. Inside Job: Defending Kubernetes Clusters Against Network Misconfigurations
Mushi et al. Designing for proactive network configuration analysis
Brunet Consulting in Computer Systems and Software
Goldschmidt Suitability of Hardware Security Modules for Securing Remote Access in High-Performance Environments