Schattkowsky et al., 2006 - Google Patents
Secure storage for physically exposed web-and application serversSchattkowsky et al., 2006
- Document ID
- 13172110516366909026
- Author
- Schattkowsky T
- Forster A
- Loeser C
- Publication year
- Publication venue
- International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06)
External Links
Snippet
Web and application servers nowadays often provide authorized users access to large amounts of sensitive data and services. These data and services need to be protected against unauthorized access. Thus, a lot of effort has been put into securing remote data …
- 230000002085 persistent 0 abstract description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7512810B1 (en) | Method and system for protecting encrypted files transmitted over a network | |
US8613102B2 (en) | Method and system for providing document retention using cryptography | |
US8185942B2 (en) | Client-server opaque token passing apparatus and method | |
US6601169B2 (en) | Key-based secure network user states | |
US7437550B2 (en) | System for providing session-based network privacy, private, persistent storage, and discretionary access control for sharing private data | |
US8176334B2 (en) | Document security system that permits external users to gain access to secured files | |
US8850219B2 (en) | Secure communications | |
US20050071657A1 (en) | Method and system for securing digital assets using time-based security criteria | |
US20050138371A1 (en) | Method and system for distribution of notifications in file security systems | |
US20050223414A1 (en) | Method and system for providing cryptographic document retention with off-line access | |
US20160294808A1 (en) | Authentication of remote host via closed ports | |
US10609001B2 (en) | Using cryptography and application gateway to eliminate malicious data access and data exfiltration | |
US20160226832A1 (en) | Server using unpredictable scrambled cookie names | |
Gritzalis et al. | Addressing threats and security issues in World Wide Web technology | |
Grzonkowski et al. | D-FOAF-Security aspects in distributed user management system | |
KR20240110793A (en) | System and method for providing dual endpoint access control for remote cloud-storage resources | |
Schattkowsky et al. | Secure storage for physically exposed web-and application servers | |
Renault et al. | Toward a security model for the future network of information | |
Al‐Tariq et al. | A scalable framework for protecting user identity and access pattern in untrusted Web server using forward secrecy, public key encryption and bloom filter | |
Murphey | Secure session management: preventing security voids in web applications | |
Scarioni et al. | The Scope of Security | |
Spinellis | Addressing Threats and Security Issues in World Wide Web Technology | |
Simpson et al. | Distributed versus centralized protection schema for the enterprise | |
Nazmul | Secure session management | |
Cao et al. | Implementation of web security & identity scheme based on session & online table |