Priyanka et al., 2015 - Google Patents
A critical survey of privacy infrastructuresPriyanka et al., 2015
View PDF- Document ID
- 10143084029782698532
- Author
- Priyanka B
- Prakash R
- Publication year
- Publication venue
- arXiv preprint arXiv:1512.07207
External Links
Snippet
Over the last two decades, the scale and complexity of the Internet and its associated technologies built on the World Wide Web has grown exponentially with access to Internet as a facility occupying a prime place with other amenities of modern lives. In years to come …
- 241000700605 Viruses 0 abstract description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Prasad et al. | Cyber security: the lifeline of information and communication technology | |
Alhenaki et al. | A survey on the security of cloud computing | |
Al-Turjman et al. | Cyber security in mobile social networks | |
Dmitrienko et al. | Security analysis of mobile two-factor authentication schemes. | |
Singh et al. | Security attacks taxonomy on bring your own devices (BYOD) model | |
Rai et al. | A study on cyber crimes cyber criminals and major security breaches | |
Rathore | Ethical hacking & security against cyber crime | |
Chivukula et al. | A study of cyber security issues and challenges | |
Thomas | Introductory chapter: Computer security threats | |
Zlatanov | Computer security and mobile security challenges | |
Koupaei et al. | Security analysis threats attacks mitigations and its impact on the internet of things (IoT) | |
Shah et al. | Appraisal of the Most Prominent Attacks due to vulnerabilities in cloud computing | |
Chinta et al. | A study on social engineering attacks and defence mechanisms | |
Petcu et al. | Security risks of cloud computing services from the new cybernetics’ threats perspective | |
Särökaari | Phishing attacks and mitigation tactics | |
Luvanda | Proposed framework for securing mobile banking applications from man in the middle attacks | |
Priyanka et al. | A critical survey of privacy infrastructures | |
Musambo et al. | Identifying Botnets Intrusion & Prevention –A Review | |
Ali et al. | Cyber Security: Challenges, Threats and Protective Measures of an Organization | |
Oppitz et al. | Security and privacy challenges | |
Armin | Mobile threats and the underground marketplace | |
Ali et al. | Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence | |
Wu et al. | General precautions against security threats for computer networks in SMEs: from the perspective of big data and IOT | |
Sowmya et al. | COMPARATIVE STUDY OF THREATS AND SOLUTIONS IN ONLINE SOCIAL NETWORKS. | |
Aydinli et al. | Abuse of Mobile Devices by Making Reverse Proxy Server |