Wei et al., 1999 - Google Patents
Session management for web-based healthcare applicationsWei et al., 1999
View PDF- Document ID
- 13000598472039783562
- Author
- Wei L
- Sengupta S
- Publication year
- Publication venue
- Proceedings of the AMIA Symposium
External Links
Snippet
In health care systems, users may access multiple applications during one session of interaction with the system. However, users must sign on to each application individually, and it is difficult to maintain a common context among these applications. We are developing …
- 230000003993 interaction 0 abstract description 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
- H04L9/0836—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US8935418B2 (en) | Access system interface | |
| US7676675B2 (en) | Architecture for connecting a remote client to a local client desktop | |
| US6986039B1 (en) | Technique for synchronizing security credentials using a trusted authenticating domain | |
| US20210326513A1 (en) | Enabling File Attachments in Calendar Events | |
| US7231661B1 (en) | Authorization services with external authentication | |
| US7814536B2 (en) | User authentication | |
| US6144959A (en) | System and method for managing user accounts in a communication network | |
| US7080077B2 (en) | Localized access | |
| US7296077B2 (en) | Method and system for web-based switch-user operation | |
| EP2520064B1 (en) | Distributed authentication with data cloud | |
| US6986038B1 (en) | Technique for synchronizing security credentials from a master directory, platform, or registry | |
| US20030177388A1 (en) | Authenticated identity translation within a multiple computing unit environment | |
| US20030084104A1 (en) | System and method for remote storage and retrieval of data | |
| US9053342B2 (en) | Multi-identity for secure file sharing | |
| US20040193921A1 (en) | Systems and methods for authenticating a user to a web server | |
| EP1316028A1 (en) | Post data processing | |
| GB2373418A (en) | Method and system to provide and manage secure access to internal computer systems from an external client | |
| WO2002005185A1 (en) | Query string processing | |
| WO2005036304A2 (en) | Mobility device server | |
| CN109165500A (en) | A kind of single sign-on authentication system and method based on cross-domain technology | |
| US7636852B1 (en) | Call center dashboard | |
| JP2002189646A (en) | Relay device | |
| Wei et al. | Session management for web-based healthcare applications | |
| Hernández et al. | WebDAV: what it is, what it does, why you need it | |
| Schimpf | Securing web access with dce |