Liu et al., 2022 - Google Patents
Network Security Technology Based on Cloud ComputingLiu et al., 2022
View PDF- Document ID
- 10381606552681081782
- Author
- Liu L
- et al.
- Publication year
- Publication venue
- Academic Journal of Computing & Information Science
External Links
Snippet
With the rapid development of computers and the Internet, cloud computing network technology is widely used in all aspects of the world with its powerful data processing capabilities. While it promotes people's convenient life, it also faces many security issues …
- 230000000875 corresponding 0 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Gill et al. | Security and privacy aspects of cloud computing: a smart campus case study | |
| Kazim et al. | A survey on top security threats in cloud computing | |
| Bamrara | Evaluating database security and cyber attacks: A relational approach | |
| Shajan et al. | Survey of security threats and countermeasures in cloud computing | |
| Kofahi et al. | Identifying the top threats in cloud computing and its suggested solutions: a survey | |
| Salutina et al. | Cybersecurity, Risk Management and Monitoring of Digital and Infocommunication Development of the Company | |
| Arunkumar et al. | A review on cloud computing security challenges, attacks and its countermeasures | |
| Kumar et al. | A survey on cloud computing security threats, attacks and countermeasures: A review | |
| Lemoudden et al. | A Survey of Cloud Computing Security Overview of Attack Vectors and Defense Mechanisms. | |
| Shyam et al. | Achieving Cloud Security Solutions through Machine and Non-Machine Learning Techniques: A Survey. | |
| GB2608435A (en) | System and method for managing transparent data encryption of database | |
| Qudratovich | Main Internet threats and ways to protect against them | |
| Mahato et al. | Cybersecurity Challenges and Threats: The Risks in Digital World | |
| Liu | Network Security Technology Based on Cloud Computing | |
| Yassin et al. | Cyber security risk assessment for determining threats and countermeasures for banking systems | |
| Nadjar et al. | A case study on the multi-vector data breach on astoria | |
| Singh et al. | A hybrid model for cyberspace security | |
| Safhi et al. | Major Security Threats and Attacks that Facing Cloud Computing with the Main Defence Strategies | |
| Zhu et al. | Study on security of electronic commerce information system | |
| Gopal et al. | Secure Cloud Computing: Mitigating Network Vulnerabilities | |
| Eneh et al. | Cybersecurity Strategy to Curb Data Insecurity and DDoS Attacks on e-government for National Development | |
| Fengxuan et al. | Research on service security reinforcement scheme based on application gateway | |
| Ramachandran et al. | Big data in cloud computing-A defense mechanism | |
| Karimli | Cloud risks and solutions review | |
| Pasupuleti et al. | Secure Database Authentication from Vulnerability Detection using Encryption Mode of Standardization |