[go: up one dir, main page]

Merlin et al., 2019 - Google Patents

Anticipated Security Model for Session Transfer and Services Using OTP

Merlin et al., 2019

View PDF
Document ID
16936301916552245268
Author
Merlin J
Prathipa A
Ramyadevi G
Radhika P
Publication year

External Links

Snippet

Internet security is a branch of computer sciences often involving browser security, network security, applications and operating systems to keep the internet as a secure channel to exchange information by reducing the risk and attacks. There are a number of studies that …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
US11368490B2 (en) Distributed cloud-based security systems and methods
US20220156369A1 (en) Method and system of monitoring and controlling exfiltration of enterprise data on cloud
US7926089B2 (en) Router for managing trust relationships
US7934253B2 (en) System and method of securing web applications across an enterprise
US20120180120A1 (en) System for data leak prevention from networks using context sensitive firewall
US9787635B1 (en) Identifying external user names and enforcing policies
US20080034424A1 (en) System and method of preventing web applications threats
Chanti et al. A literature review on classification of phishing attacks
Hasan et al. Towards a threat model and security analysis of video conferencing systems
US12003537B2 (en) Mitigating phishing attempts
US9003186B2 (en) HTTP authentication and authorization management
EP2311218B1 (en) Http authentication and authorization management
US8656462B2 (en) HTTP authentication and authorization management
Merlin et al. Anticipated Security Model for Session Transfer and Services Using OTP
Thamizhiniyal Probable Defense Representation for Session Transfer and Network Services Using OTP
Bixenstine Employment Law Implications of a Remote Workplace.
US12294605B2 (en) Providing identity protection
Vrakas et al. Privacy requirements engineering for trustworthy e-government services
Gupta et al. Information security and cloud computing
Riyaj et al. A Survey On Blocking Hacking Users In Cloud Network Using Ticket Based Security Manager
Motawie et al. Addressing Security Issues in Cloud Computing