[go: up one dir, main page]

Foltz et al., 2019 - Google Patents

Secure Endpoint Device Agent Architecture.

Foltz et al., 2019

View PDF
Document ID
14265449855676025801
Author
Foltz K
Simpson W
Publication year
Publication venue
ICEIS (1)

External Links

Snippet

Software agents are installed on endpoint devices to monitor local activity, prevent harmful behavior, allow remote management, and report back to the enterprise. The challenge in this environment is the security of the agents and their communication with the enterprise. This …
Continue reading at pdfs.semanticscholar.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Similar Documents

Publication Publication Date Title
Bhatia et al. Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues
EP3258374B1 (en) Systems and methods for detecting and reacting to malicious activity in computer networks
US8438631B1 (en) Security enclave device to extend a virtual secure processing environment to a client device
Kim et al. A security analysis of blockchain-based did services
US20070192344A1 (en) Threats and countermeasures schema
Kumar et al. Exploring security issues and solutions in cloud computing services–a survey
Mohamed et al. Adaptive security architectural model for protecting identity federation in service oriented computing
US12216769B2 (en) Secure element enforcing a security policy for device peripherals
Panos et al. A security evaluation of FIDO’s UAF protocol in mobile and embedded devices
WO2014105914A1 (en) Security enclave device to extend a virtual secure processing environment to a client device
Dou et al. Robust insider attacks countermeasure for Hadoop: Design and implementation
Muzammal et al. A study on secured authentication and authorization in Internet of Things: Potential of blockchain technology
Kim et al. Security analysis and bypass user authentication bound to device of windows hello in the wild
Cheng et al. Per-user network access control kernel module with secure multifactor authentication.
Fongen et al. Integrity attestation in military IoT
Sookhak et al. Security and privacy of smart cities: issues and challenge
Sánchez et al. Security issues and threats that may affect the hybrid cloud of FINESCE
Shepherd Zero trust architecture: Framework and case study
Liu et al. Risk‐Based Dynamic Identity Authentication Method Based on the UCON Model
Binu et al. A mobile based remote user authentication scheme without verifier table for cloud based services
Alzomai et al. The mobile phone as a multi OTP device using trusted computing
Megala et al. A Review on Blockchain-Based Device Authentication Schemes for IoT
Jang-Jaccard et al. Portable key management service for cloud storage
Foltz et al. Secure Endpoint Device Agent Architecture.
Salehi et al. Cloud computing security challenges and its potential solution