Foltz et al., 2019 - Google Patents
Secure Endpoint Device Agent Architecture.Foltz et al., 2019
View PDF- Document ID
- 14265449855676025801
- Author
- Foltz K
- Simpson W
- Publication year
- Publication venue
- ICEIS (1)
External Links
Snippet
Software agents are installed on endpoint devices to monitor local activity, prevent harmful behavior, allow remote management, and report back to the enterprise. The challenge in this environment is the security of the agents and their communication with the enterprise. This …
- 238000004891 communication 0 abstract description 15
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bhatia et al. | Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues | |
EP3258374B1 (en) | Systems and methods for detecting and reacting to malicious activity in computer networks | |
US8438631B1 (en) | Security enclave device to extend a virtual secure processing environment to a client device | |
Kim et al. | A security analysis of blockchain-based did services | |
US20070192344A1 (en) | Threats and countermeasures schema | |
Kumar et al. | Exploring security issues and solutions in cloud computing services–a survey | |
Mohamed et al. | Adaptive security architectural model for protecting identity federation in service oriented computing | |
US12216769B2 (en) | Secure element enforcing a security policy for device peripherals | |
Panos et al. | A security evaluation of FIDO’s UAF protocol in mobile and embedded devices | |
WO2014105914A1 (en) | Security enclave device to extend a virtual secure processing environment to a client device | |
Dou et al. | Robust insider attacks countermeasure for Hadoop: Design and implementation | |
Muzammal et al. | A study on secured authentication and authorization in Internet of Things: Potential of blockchain technology | |
Kim et al. | Security analysis and bypass user authentication bound to device of windows hello in the wild | |
Cheng et al. | Per-user network access control kernel module with secure multifactor authentication. | |
Fongen et al. | Integrity attestation in military IoT | |
Sookhak et al. | Security and privacy of smart cities: issues and challenge | |
Sánchez et al. | Security issues and threats that may affect the hybrid cloud of FINESCE | |
Shepherd | Zero trust architecture: Framework and case study | |
Liu et al. | Risk‐Based Dynamic Identity Authentication Method Based on the UCON Model | |
Binu et al. | A mobile based remote user authentication scheme without verifier table for cloud based services | |
Alzomai et al. | The mobile phone as a multi OTP device using trusted computing | |
Megala et al. | A Review on Blockchain-Based Device Authentication Schemes for IoT | |
Jang-Jaccard et al. | Portable key management service for cloud storage | |
Foltz et al. | Secure Endpoint Device Agent Architecture. | |
Salehi et al. | Cloud computing security challenges and its potential solution |