Hafström Fremlin et al., 2023 - Google Patents
Securing Sweden's Digital AssetsHafström Fremlin et al., 2023
View PDF- Document ID
- 16852110256871192990
- Author
- Hafström Fremlin P
- Tomic Lindvall D
- Publication year
External Links
Snippet
This thesis addresses the gap in literature and research surrounding the historical context of database security in Sweden. Through extensive research and in-depth interviews with Swedish cybersecurity experts, it highlights the underrepresented “story” of database …
- 238000011160 research 0 abstract description 79
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Adkins et al. | Building secure and reliable systems: best practices for designing, implementing, and maintaining systems | |
Stuttard et al. | The web application hacker's handbook: Finding and exploiting security flaws | |
Dotson | Practical cloud security | |
Rains | Cybersecurity Threats, Malware Trends, and Strategies: Discover risk mitigation strategies for modern threats to your organization | |
Das | A risk-reduction-based incentivization model for human-centered multi-factor authentication | |
Wheeler et al. | Cloud storage security: A practical guide | |
Aswathy et al. | Privacy breaches through cyber vulnerabilities: Critical issues, open challenges, and possible countermeasures for the future | |
Azem Qashou et al. | Qualitative Exploration of Data Security Risks in Mobile Cloud Computing for Higher Education | |
US12028376B2 (en) | Systems and methods for creation, management, and storage of honeyrecords | |
Lakhe | Practical Hadoop Security | |
Chapple et al. | CompTIA Security+ Study Guide with Over 500 Practice Test Questions: Exam SY0-701 | |
Hafström Fremlin et al. | Securing Sweden’s Digital Assets | |
Maleh | Web application PenTesting: A comprehensive Guide for professionals | |
McDonald | Grokking Web Application Security | |
Betz | An analysis of the relationship between security information technology enhancements and computer security breaches and incidents | |
Tytarenko | Selection of the best security controls for rapid development of enterprise-level cyber security | |
Khidzir et al. | Guardians of Data: A Comprehensive Guide to Digital Data Protection | |
Tellenbach et al. | Security of data science and data science for security | |
Williams | Cybersecurity: Zero-day vulnerabilities and attack vectors | |
Gracy | A global analysis of data breaches from 2004 to 2024 | |
Zainabi et al. | Security risks of chatbots in customer service: a comprehensive literature review | |
Andress | Foundations of Information Security | |
Díaz de León Guillén et al. | A systematic review of security threats and countermeasures in SaaS | |
Barker | Confident Cyber Security: The Essential Insights and How to Protect from Threats | |
Ofuokwu | Strategies for Securing Users’ Personal Data against Security Threats in MCC Networks |