[go: up one dir, main page]

Schattkowsky et al., 2006 - Google Patents

Secure storage for physically exposed web-and application servers

Schattkowsky et al., 2006

Document ID
13172110516366909026
Author
Schattkowsky T
Forster A
Loeser C
Publication year
Publication venue
International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06)

External Links

Snippet

Web and application servers nowadays often provide authorized users access to large amounts of sensitive data and services. These data and services need to be protected against unauthorized access. Thus, a lot of effort has been put into securing remote data …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies

Similar Documents

Publication Publication Date Title
US7512810B1 (en) Method and system for protecting encrypted files transmitted over a network
US8613102B2 (en) Method and system for providing document retention using cryptography
US8185942B2 (en) Client-server opaque token passing apparatus and method
US6601169B2 (en) Key-based secure network user states
US7437550B2 (en) System for providing session-based network privacy, private, persistent storage, and discretionary access control for sharing private data
US8176334B2 (en) Document security system that permits external users to gain access to secured files
US8850219B2 (en) Secure communications
US20050071657A1 (en) Method and system for securing digital assets using time-based security criteria
US20050138371A1 (en) Method and system for distribution of notifications in file security systems
US20050223414A1 (en) Method and system for providing cryptographic document retention with off-line access
US20160294808A1 (en) Authentication of remote host via closed ports
US10609001B2 (en) Using cryptography and application gateway to eliminate malicious data access and data exfiltration
US20160226832A1 (en) Server using unpredictable scrambled cookie names
Gritzalis et al. Addressing threats and security issues in World Wide Web technology
Grzonkowski et al. D-FOAF-Security aspects in distributed user management system
KR20240110793A (en) System and method for providing dual endpoint access control for remote cloud-storage resources
Schattkowsky et al. Secure storage for physically exposed web-and application servers
Renault et al. Toward a security model for the future network of information
Al‐Tariq et al. A scalable framework for protecting user identity and access pattern in untrusted Web server using forward secrecy, public key encryption and bloom filter
Murphey Secure session management: preventing security voids in web applications
Scarioni et al. The Scope of Security
Spinellis Addressing Threats and Security Issues in World Wide Web Technology
Simpson et al. Distributed versus centralized protection schema for the enterprise
Nazmul Secure session management
Cao et al. Implementation of web security & identity scheme based on session & online table