Jneid et al., 2016 - Google Patents
Cloud Application ModelJneid et al., 2016
- Document ID
- 15412856462067136110
- Author
- Jneid A
- Gaffar A
- Publication year
- Publication venue
- Proceedings of the International Conference on Security and Management (SAM)
External Links
Snippet
Privacy and confidentiality concerns over Personal Health Records (PHR) are on the rise, largely driven by how the Internet is being used as vehicle to transfer such records PHR are generated to the benefit of the user; these records are exchanged through emails, or 3rd …
- 239000008186 active pharmaceutical agent 0 description 21
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11025668B2 (en) | Detecting attacks using compromised credentials via internal network monitoring | |
KR102217916B1 (en) | System and method for biometric protocol standards | |
US7685430B1 (en) | Initial password security accentuated by triple encryption and hashed cache table management on the hosted site's server | |
TWI470989B (en) | Method and apparatus for providing trusted single sing-on access to applications and internet-based services | |
US7650505B1 (en) | Methods and apparatus for persistence of authentication and authorization for a multi-tenant internet hosted site using cookies | |
US7730523B1 (en) | Role-based access using combinatorial inheritance and randomized conjugates in an internet hosted environment | |
US20140053252A1 (en) | System and Method for Secure Document Distribution | |
US10375084B2 (en) | Methods and apparatuses for improved network communication using a message integrity secure token | |
JP2003228520A (en) | Method and system for offline access to secured electronic data | |
US20210392003A1 (en) | Decentralized computing systems and methods for performing actions using stored private data | |
US10623400B2 (en) | Method and device for credential and data protection | |
US11764976B2 (en) | System and method for secure internet communications | |
Al Maqbali et al. | AutoPass: An automatic password generator | |
Murray et al. | Cloud service security & application vulnerability | |
US10740478B2 (en) | Performing an operation on a data storage | |
Harisha et al. | Open Standard Authorization Protocol: OAuth 2.0 Defenses and Working Using Digital Signatures | |
Jneid et al. | Cloud Application Model | |
Weider et al. | A web-based wireless mobile system design of security and privacy framework for u-Healthcare | |
Aiemworawutikul et al. | Vulnerability Assessment in National Identity Services | |
Herzig | Identity and Access Management | |
ALnwihel et al. | A Novel Cloud Authentication Framework | |
Kangwa et al. | Improved Protection of User Data Through the Use of a Traceable Anonymous One Time Password | |
Zhang et al. | Status Quo and Prospect on Mobile Database Security | |
Al-Harrasi | Context-Aware Data Leakage Prevention Theoretical Approach For Mobile-Cloud Computing | |
WO2024157087A1 (en) | Systems and methods for managing and protecting data in computing networks |