Sasaki et al., 2019 - Google Patents
Access control architecture for smart city IoT platformSasaki et al., 2019
- Document ID
- 86769551634040510
- Author
- Sasaki T
- Morita Y
- Jada A
- Publication year
- Publication venue
- 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)
External Links
Snippet
Smart city is a concept that leverages IoT (Internet of Things) for efficient operations. Many use cases have been proposed, for example efficient garbage collection, smart traffic control, improvement of safety and security of cities, and disaster recovery. To provide better …
- 238000011084 recovery 0 abstract description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/32—Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
- G06F19/322—Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/009—Trust
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Xu et al. | Blockchain-oriented privacy protection of sensitive data in the internet of vehicles | |
| US7844717B2 (en) | Use of proxy servers and pseudonymous transactions to maintain individual's privacy in the competitive business of maintaining personal history databases | |
| US20120131189A1 (en) | Apparatus and method for information sharing and privacy assurance | |
| Mahapatra et al. | Healthcare models and algorithms for privacy and security in healthcare records | |
| CN110990858B (en) | A cross-cloud resource sharing system and method based on distributed information flow control | |
| Hemmati et al. | Blockchain‐based internet of vehicles (BIoV): a systematic review of surveys and reviews | |
| Jakóbik | Big data security | |
| Lu et al. | Secure and real-time traceable data sharing in cloud-assisted IoT | |
| Surisetty | Zero-Trust Data Fabrics: A Policy-Driven Model for Secure Cross-Cloud Healthcare and Financial Data Exchanges | |
| Joshi et al. | Security and privacy challenges of a digital government | |
| Mohammad et al. | Exploring cyber security measures in smart cities | |
| Vijayalakshmi et al. | Shared access control models for big data: a perspective study and analysis | |
| Sasaki et al. | Access control architecture for smart city IoT platform | |
| Peisert et al. | Turtles all the way down: a clean-slate, ground-up, first-principles approach to secure systems | |
| Qureshi et al. | Contemplating security challenges and threats for smart cities | |
| Dhasarathan et al. | Safeguarding user privacy at the edge of fog computing networks in decentralized distributed computing | |
| Johri et al. | Security framework using Hadoop for big data | |
| Leila et al. | A new framework of authentication over cloud computing | |
| Alsarra et al. | An OpenRBAC semantic model for access control in vehicular networks | |
| Beleuta | Data privacy and security in Business Intelligence and Analytics | |
| Runsewe | A policy-based management framework for cloud computing security | |
| Vusumuzi et al. | AI-Driven Zero-Trust Models for Blockchain-Supported Healthcare Ecosystems | |
| Dhinesh et al. | Decentralized Data Management in IoT: Leveraging Blockchain for Improved Integrity and Trust | |
| Kraus | Security management process in distributed, large scale high performance systems | |
| Xu et al. | Blockchain based access control: a review and future perspectives |