[go: up one dir, main page]

Bartholomew - Google Patents

An Efficient Cloud-Based Result Security System Using Digital Certificate

Bartholomew

View HTML
Document ID
18026052369904906131
Author
Bartholomew E

External Links

Snippet

Developments in Cloud Computing and its robust nature has made academic institutions to build their institution applications which include results around the Cloud. The challenges of security of data in when it is managed as a service (DBaaS) in the Cloud and the believe …
Continue reading at www.academia.edu (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)

Similar Documents

Publication Publication Date Title
Zissis et al. Addressing cloud computing security issues
US8839395B2 (en) Single sign-on between applications
US9160535B2 (en) Truly anonymous cloud key broker
US20100175119A1 (en) Management of Access Authorization to Web Forums Open to Anonymous Users Within an Organization
Al-Sherideh et al. Development of a secure model for mobile government applications in Jordan
Murray et al. Cloud service security & application vulnerability
Shaikh et al. Secured Authentication by Single Sign On (SSO): A Big Picture
Othman et al. A protocol for decentralized biometric-based self-sovereign identity ecosystem
Küppers et al. Practical security for electronic examinations on students’ devices
Hood et al. IT Security Plan for Flight Simulation Program
Adlam et al. Applying blockchain technology to security-related aspects of electronic healthcare record infrastructure
Haddon et al. The emergence of post covid-19 zero trust security architectures
Simpson et al. Secure Identity for Enterprises.
Madhura et al. Designing an optimized confidential-data management system using preeminent access-control and block-chain
Bartholomew An Efficient Cloud-Based Result Security System Using Digital Certificate
Mupila et al. An innovative authentication model for the enhancement of cloud security
Stöcklin Evaluating SSH for modern deployments
Eke et al. An Efficient Cloud-Based Result Security System Using Digital Certificate
Ghazizadeh et al. Secure openID authentication model by using trusted computing
Escobar et al. Implementing Free TLS Certificates for Virtual Services: An Experimental Approach in Proxmox VE
Quinton Safety of web applications: risks, encryption and handling vulnerabilities with PHP
Westfall Basics of Linux security
Marisargunam Cloud Service Authentication Based on Advanced Encryption Standard (AES) For Ensure Privacy
Baghela et al. Cloud Data Protection with OTP Model
Strasser Secure and Usable Decentralized Web Wallet