Cha et al., 2023 - Google Patents
A blockchain-enabled IoT auditing management system complying with ISO/IEC 15408-2Cha et al., 2023
- Document ID
- 7529172650862765959
- Author
- Cha S
- Meng W
- Li W
- Yeh K
- Publication year
- Publication venue
- Computers & Industrial Engineering
External Links
Snippet
Recently, blockchain has attracted attention as one of the most promising key platform technologies for leveraging IoT (Internet of Things) security and auditing management with trusted and decentralized architecture. Therefore, the possibilities of using blockchain for …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102542720B1 (en) | System for providing internet of behavior based intelligent data security platform service for zero trust security | |
Pasquier et al. | Data provenance to audit compliance with privacy policy in the Internet of Things | |
Cha et al. | A blockchain-enabled IoT auditing management system complying with ISO/IEC 15408-2 | |
Toapanta et al. | Analysis for the evaluation and security management of a database in a public organization to mitigate cyber attacks | |
Henriques et al. | A survey on forensics and compliance auditing for critical infrastructure protection | |
Anand et al. | Data security and privacy functions in fog computing for healthcare 4.0 | |
Porras et al. | Security in the internet of things-a systematic mapping study | |
Grimaila et al. | Design and analysis of a dynamically configured log-based distributed security event detection methodology | |
Bezas et al. | Comparative analysis of open source security information & event management systems (siems) | |
Miloslavskaya | Designing blockchain-based SIEM 3.0 system | |
Kamal et al. | Forensics chain for evidence preservation system: An evidence preservation forensics framework for internet of things‐based smart city security using blockchain | |
Miloslavskaya et al. | New SIEM system for the internet of things | |
Porras et al. | Security challenges and solutions in the internet of things | |
Dorigo | Security information and event management | |
US11741409B1 (en) | Compliance management system | |
Fehér et al. | Log file authentication and storage on blockchain network | |
Bitar et al. | Gdpr: Securing personal data in compliance with new eu-regulations | |
Rjaibi et al. | The mean failure cost cybersecurity model toward security measures and associated mechanisms | |
Prowell et al. | Position Papers for the ASCR Workshop on Cybersecurity and Privacy for Scientific Computing Ecosystems | |
Alexandrov et al. | Design and security analysis of a fragment of internet of things telecommunication system | |
Benedik et al. | Digital citizens in a smart city: The impact and security challenges of IoT on citizen’s data privacy | |
Al-Fedaghi et al. | Events classification in log audit | |
Yakubu et al. | Security Protocols and Mechanisms for Sharing Near-Real-Time Environmental Data with Multiple Audiences During Disasters | |
Alqahtani | A novel approach to providing secure data storage using multi cloud computing | |
Forsberg | Penetration Testing and PrivacyAssessment of Top-RankedHealth and Fitness Apps: An Empirical Study |