[go: up one dir, main page]

Kuacharoen, 2010 - Google Patents

A practical customer privacy protection on shared servers

Kuacharoen, 2010

View PDF
Document ID
7116265250199625303
Author
Kuacharoen P
Publication year
Publication venue
2010 IEEE International Conference on Information Theory and Information Security

External Links

Snippet

Customer privacy protection is very important in an e-commerce site. Without such protection, the customers may not be willing to provide personal information or conduct business at the site. Therefore, the merchant should protect its customer information in order …
Continue reading at 202.21.149.33 (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction

Similar Documents

Publication Publication Date Title
KR102055116B1 (en) Data security service
US9544280B2 (en) Utilization of a protected module to prevent offline dictionary attacks
US8185942B2 (en) Client-server opaque token passing apparatus and method
EP2519906B1 (en) Method and system for user authentication
Nyang et al. Keylogging-resistant visual authentication protocols
Zhao et al. All your browser-saved passwords could belong to us: A security analysis and a cloud-based new design
US10250589B2 (en) System and method for protecting access to authentication systems
Zhao et al. Toward a secure and usable cloud-based password manager for web browsers
Cheng Security attack safe mobile and cloud-based one-time password tokens using rubbing encryption algorithm
Lee et al. Secure and efficient protection for HTTP cookies with self‐verification
CN105978994A (en) Web system oriented logging-in method
US9231941B1 (en) Secure data entry
Raddum et al. Security analysis of mobile phones used as OTP generators
WO2008053279A1 (en) Logging on a user device to a server
CN115118455A (en) Attribute-based encryption access control anti-crawler system and method for webpage security
Zaidi et al. Exploring the landscape of password managers for individual users through innovative solution
Khande et al. An effective mechanism for securing and managing password using AES-256 encryption & PBKDF2
Zhao et al. A security analysis of two commercial browser and cloud based password managers
Soni et al. Security and privacy in cloud computing
Kuacharoen A practical customer privacy protection on shared servers
Al-Bajjari et al. Optimized authentication scheme for web application
Reddy et al. Data Storage on Cloud using Split-Merge and Hybrid Cryptographic Techniques
Upadhyay et al. Integrating Multiple Security Features in and Online Banking Platform
Arvin S. Lat et al. SOUL System: secure online USB login system
Das et al. Mobile security (otp) by cloud computing