[go: up one dir, main page]

Jneid et al., 2016 - Google Patents

Cloud Application Model

Jneid et al., 2016

Document ID
15412856462067136110
Author
Jneid A
Gaffar A
Publication year
Publication venue
Proceedings of the International Conference on Security and Management (SAM)

External Links

Snippet

Privacy and confidentiality concerns over Personal Health Records (PHR) are on the rise, largely driven by how the Internet is being used as vehicle to transfer such records PHR are generated to the benefit of the user; these records are exchanged through emails, or 3rd …
Continue reading at search.proquest.com (other versions)

Similar Documents

Publication Publication Date Title
US11025668B2 (en) Detecting attacks using compromised credentials via internal network monitoring
KR102217916B1 (en) System and method for biometric protocol standards
US7685430B1 (en) Initial password security accentuated by triple encryption and hashed cache table management on the hosted site's server
TWI470989B (en) Method and apparatus for providing trusted single sing-on access to applications and internet-based services
US7650505B1 (en) Methods and apparatus for persistence of authentication and authorization for a multi-tenant internet hosted site using cookies
US7730523B1 (en) Role-based access using combinatorial inheritance and randomized conjugates in an internet hosted environment
US20140053252A1 (en) System and Method for Secure Document Distribution
US10375084B2 (en) Methods and apparatuses for improved network communication using a message integrity secure token
JP2003228520A (en) Method and system for offline access to secured electronic data
US20210392003A1 (en) Decentralized computing systems and methods for performing actions using stored private data
US10623400B2 (en) Method and device for credential and data protection
US11764976B2 (en) System and method for secure internet communications
Al Maqbali et al. AutoPass: An automatic password generator
Murray et al. Cloud service security & application vulnerability
US10740478B2 (en) Performing an operation on a data storage
Harisha et al. Open Standard Authorization Protocol: OAuth 2.0 Defenses and Working Using Digital Signatures
Jneid et al. Cloud Application Model
Weider et al. A web-based wireless mobile system design of security and privacy framework for u-Healthcare
Aiemworawutikul et al. Vulnerability Assessment in National Identity Services
Herzig Identity and Access Management
ALnwihel et al. A Novel Cloud Authentication Framework
Kangwa et al. Improved Protection of User Data Through the Use of a Traceable Anonymous One Time Password
Zhang et al. Status Quo and Prospect on Mobile Database Security
Al-Harrasi Context-Aware Data Leakage Prevention Theoretical Approach For Mobile-Cloud Computing
WO2024157087A1 (en) Systems and methods for managing and protecting data in computing networks