Kuacharoen, 2010 - Google Patents
A practical customer privacy protection on shared serversKuacharoen, 2010
View PDF- Document ID
- 7116265250199625303
- Author
- Kuacharoen P
- Publication year
- Publication venue
- 2010 IEEE International Conference on Information Theory and Information Security
External Links
Snippet
Customer privacy protection is very important in an e-commerce site. Without such protection, the customers may not be willing to provide personal information or conduct business at the site. Therefore, the merchant should protect its customer information in order …
- 238000000034 method 0 abstract description 11
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| KR102055116B1 (en) | Data security service | |
| US9544280B2 (en) | Utilization of a protected module to prevent offline dictionary attacks | |
| US8185942B2 (en) | Client-server opaque token passing apparatus and method | |
| EP2519906B1 (en) | Method and system for user authentication | |
| Nyang et al. | Keylogging-resistant visual authentication protocols | |
| Zhao et al. | All your browser-saved passwords could belong to us: A security analysis and a cloud-based new design | |
| US10250589B2 (en) | System and method for protecting access to authentication systems | |
| Zhao et al. | Toward a secure and usable cloud-based password manager for web browsers | |
| Cheng | Security attack safe mobile and cloud-based one-time password tokens using rubbing encryption algorithm | |
| Lee et al. | Secure and efficient protection for HTTP cookies with self‐verification | |
| CN105978994A (en) | Web system oriented logging-in method | |
| US9231941B1 (en) | Secure data entry | |
| Raddum et al. | Security analysis of mobile phones used as OTP generators | |
| WO2008053279A1 (en) | Logging on a user device to a server | |
| CN115118455A (en) | Attribute-based encryption access control anti-crawler system and method for webpage security | |
| Zaidi et al. | Exploring the landscape of password managers for individual users through innovative solution | |
| Khande et al. | An effective mechanism for securing and managing password using AES-256 encryption & PBKDF2 | |
| Zhao et al. | A security analysis of two commercial browser and cloud based password managers | |
| Soni et al. | Security and privacy in cloud computing | |
| Kuacharoen | A practical customer privacy protection on shared servers | |
| Al-Bajjari et al. | Optimized authentication scheme for web application | |
| Reddy et al. | Data Storage on Cloud using Split-Merge and Hybrid Cryptographic Techniques | |
| Upadhyay et al. | Integrating Multiple Security Features in and Online Banking Platform | |
| Arvin S. Lat et al. | SOUL System: secure online USB login system | |
| Das et al. | Mobile security (otp) by cloud computing |