[go: up one dir, main page]

Kaur et al., 2022 - Google Patents

Pre-requisite Concepts for Security and Privacy

Kaur et al., 2022

Document ID
15568066457231904279
Author
Kaur I
Bharti S
Saxena S
Publication year
Publication venue
Internet of Things: Security and Privacy in Cyberspace

External Links

Snippet

Nowadays, technology has reached a level that it is dissolved in our lives. Expanding rapidly in the last several decades, information security has become a major concern for everyone connected to the Internet. Information security ensures that our information is only available …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators

Similar Documents

Publication Publication Date Title
Bhatia et al. Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues
Sumitra et al. A survey of cloud authentication attacks and solution approaches
Alhothaily et al. A secure and practical authentication scheme using personal devices
Agarwal et al. A survey on cloud computing security issues and cryptographic techniques
Dubey et al. Cyber security model to secure data transmission using cloud cryptography
Alzuwaini et al. An Efficient Mechanism to Prevent the Phishing Attacks.
Chidambaram et al. Enhancing the security of customer data in cloud environments using a novel digital fingerprinting technique
Kushwaha et al. A brief survey of challenge–response authentication mechanisms
Williams et al. Security aspects of internet of things–a survey
Bakro et al. Hybrid blockchain-enabled security in cloud storage infrastructure using ECC and AES algorithms
Kanaga Priya et al. Various attacks on the implementation of cryptographic algorithms
Vrana Cyber security and data ownership
CN114826702B (en) Database access password encryption method and device and computer equipment
Aldweesh Enhancing metaverse security with block chain authentication: methods and analysis
CN110572392A (en) Identity authentication method based on HyperLegger network
Sehgal et al. Cloud computing and information security
Blaze Key escrow from a safe distance: looking back at the clipper chip
Achary Cryptography and network security: an introduction
Geetha et al. Introduction To Cryptography And Network Security
Chauhan et al. Computer Security and Encryption: An Introduction
Kankal et al. An adaptive authentication based on blockchain for bigdata hadoop framework
Kaur et al. Pre-requisite Concepts for Security and Privacy
Gagged et al. Improved secure dynamic bit standard technique for a private cloud platform to address security challenges
Attia et al. E-mail systems in cloud computing environment privacy, trust and security challenges
ALnwihel et al. A Novel Cloud Authentication Framework