Dakic et al., 2022 - Google Patents
Linux Security in Physical, Virtual, and Cloud EnvironmentsDakic et al., 2022
View PDF- Document ID
- 9840434925607569031
- Author
- Dakic V
- Jakobovic K
- Zgrablic L
- Publication year
- Publication venue
- Proceedings of the 33rd DAAAM International Symposium, ISSN
External Links
Snippet
This paper will cover some of the available Linux methodologies and tools that can be used to enhance Linux security. It gives the reader some orientation in the world of Linux security. We will define what are the components of security and risk management, followed by …
- 238000000034 method 0 abstract description 28
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2123—Dummy operation
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Kodakandla | Securing cloud-native infrastructure with Zero Trust Architecture | |
| US8732856B2 (en) | Cross-domain security for data vault | |
| US20090300712A1 (en) | System and method for dynamically enforcing security policies on electronic files | |
| US8214398B1 (en) | Role based access controls | |
| US8601580B2 (en) | Secure operating system/web server systems and methods | |
| Bertino et al. | Services for zero trust architectures-a research roadmap | |
| ACHAR et al. | Data security in cloud: A review | |
| Vazão et al. | Implementing and evaluating a GDPR-compliant open-source SIEM solution | |
| Dakic et al. | Linux Security in Physical, Virtual, and Cloud Environments | |
| Nagasundari et al. | Extensive Review of Threat Models for DevSecOps | |
| Armando et al. | Developing a NATO BYOD security policy | |
| Kaur et al. | Enhancing features of cloud computing using cloud access security brokers to avoid data breaches | |
| Ngo et al. | Serverless computing architecture security and quality analysis for back-end development | |
| Haber et al. | Privileged Access Management (PAM) | |
| Kadebu et al. | A security requirements perspective towards a secured nosql database environment | |
| Dimov et al. | Result oriented time correlation between security and risk assessments, and individual environment compliance framework | |
| Hirano et al. | Introducing role-based access control to a secure virtual machine monitor: security policy enforcement mechanism for distributed computers | |
| Kumar et al. | A survey on security issues in cloud computing | |
| Rajba et al. | Identity and Access Management Architecture in the SILVANUS Project | |
| Loukkaanhuhta | Transforming technical IT security architecture to a cloud era | |
| Cesarano et al. | KubeFence: Security Hardening of the Kubernetes Attack Surface | |
| Bolívar et al. | Modeling Cloud Computing security scenarios through attack trees | |
| Lad | Security Processes | |
| Jain et al. | Security Aspects in Cloud Computing | |
| Mehfuz | CLOUD USAGE AUTHENTICATION SCENARIOS BASED API ACCESS |