Masluk et al., 2018 - Google Patents
Protecting personal data with blockchain technologyMasluk et al., 2018
- Document ID
- 18358210894856151381
- Author
- Masluk A
- Gofman M
- Publication year
- Publication venue
- Information Technology-New Generations: 15th International Conference on Information Technology
External Links
Snippet
Abstract Service providers depend on the ability to host, analyze, and exchange the personal data of users. Legal and contractual frameworks aim to protect the rights of users regarding this data. However, a confluence of factors render these rights difficult to …
- 238000005516 engineering process 0 title abstract description 15
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2145—Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11468192B2 (en) | Runtime control of automation accuracy using adjustable thresholds | |
Bertino et al. | Data transparency with blockchain and AI ethics | |
Hughes et al. | Beyond Bitcoin: What blockchain and distributed ledger technologies mean for firms | |
Jain et al. | Big data privacy: a technological perspective and review | |
CN111149332A (en) | System and method for implementing centralized privacy control in decentralized systems | |
KR102160664B1 (en) | General Data Protection Regulation Complied Blockchain Architecture for Personally Identifiable Information Management | |
Khansa et al. | Assessing innovations in cloud security | |
Sasikumar et al. | A secure big data storage framework based on blockchain consensus mechanism with flexible finality | |
Shrestha et al. | User data sharing frameworks: a blockchain-based incentive solution | |
Kumar et al. | Content sensitivity based access control framework for Hadoop | |
Shen | Blockchain technology and its applications in digital content copyright protection | |
Roth et al. | Securing federated platforms: Collective risks and responses | |
Guerar et al. | TruthSeekers chain: Leveraging invisible CAPPCHA, SSI and blockchain to combat disinformation on social media | |
Masluk et al. | Protecting personal data with blockchain technology | |
Schneider et al. | Why Data Anonymization Has Not Taken Off | |
Goodman et al. | Deficiencies of Compliancy for Data and Storage: Isolating the CIA Triad Components to Identify Gaps to Security | |
US20230283640A1 (en) | Systems and methods for assigning security policies to files and/or records | |
Chabani et al. | The role of blockchain technology in enhancing security management in the supply chain | |
Sun et al. | Privacy preserving or trapping? | |
Sharma et al. | Accountable human subject research data processing using lohpi | |
Mattsson | Controlling Privacy and the Use of Data Assets-Volume 2: What is the New World Currency–Data or Trust? | |
Ratti et al. | The gaps of identity management in fulfilling personal data protection regulations’ requirements and research opportunities | |
Mechkaroska et al. | Secure big data and IoT with implementation of blockchain | |
Ok et al. | Data Anonymization Techniques | |
US20230297721A1 (en) | Systems and methods for creating rules based on security policies |