Bartholomew - Google Patents
An Efficient Cloud-Based Result Security System Using Digital CertificateBartholomew
View HTML- Document ID
- 18026052369904906131
- Author
- Bartholomew E
External Links
Snippet
Developments in Cloud Computing and its robust nature has made academic institutions to build their institution applications which include results around the Cloud. The challenges of security of data in when it is managed as a service (DBaaS) in the Cloud and the believe …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zissis et al. | Addressing cloud computing security issues | |
US8839395B2 (en) | Single sign-on between applications | |
US9160535B2 (en) | Truly anonymous cloud key broker | |
US20100175119A1 (en) | Management of Access Authorization to Web Forums Open to Anonymous Users Within an Organization | |
Al-Sherideh et al. | Development of a secure model for mobile government applications in Jordan | |
Murray et al. | Cloud service security & application vulnerability | |
Shaikh et al. | Secured Authentication by Single Sign On (SSO): A Big Picture | |
Othman et al. | A protocol for decentralized biometric-based self-sovereign identity ecosystem | |
Küppers et al. | Practical security for electronic examinations on students’ devices | |
Hood et al. | IT Security Plan for Flight Simulation Program | |
Adlam et al. | Applying blockchain technology to security-related aspects of electronic healthcare record infrastructure | |
Haddon et al. | The emergence of post covid-19 zero trust security architectures | |
Simpson et al. | Secure Identity for Enterprises. | |
Madhura et al. | Designing an optimized confidential-data management system using preeminent access-control and block-chain | |
Bartholomew | An Efficient Cloud-Based Result Security System Using Digital Certificate | |
Mupila et al. | An innovative authentication model for the enhancement of cloud security | |
Stöcklin | Evaluating SSH for modern deployments | |
Eke et al. | An Efficient Cloud-Based Result Security System Using Digital Certificate | |
Ghazizadeh et al. | Secure openID authentication model by using trusted computing | |
Escobar et al. | Implementing Free TLS Certificates for Virtual Services: An Experimental Approach in Proxmox VE | |
Quinton | Safety of web applications: risks, encryption and handling vulnerabilities with PHP | |
Westfall | Basics of Linux security | |
Marisargunam | Cloud Service Authentication Based on Advanced Encryption Standard (AES) For Ensure Privacy | |
Baghela et al. | Cloud Data Protection with OTP Model | |
Strasser | Secure and Usable Decentralized Web Wallet |