Wang, 2002 - Google Patents
Improving information system security through removing single point of attackWang, 2002
- Document ID
- 2484800069738271398
- Author
- Wang X
- Publication year
External Links
Snippet
In a computer information system, a single point of failure is a critical point such that, if not working properly, it will dramatically compromise the whole system's availability. Replication of such a point may increase the system's availability but will not improve the confidentiality …
- 239000003795 chemical substances by application 0 description 107
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10673626B2 (en) | Threshold secret share authentication proof and secure blockchain voting with hardware security modules | |
Jarecki et al. | TOPPSS: cost-minimal password-protected secret sharing based on threshold OPRF | |
JP7585315B2 (en) | Digital signature generation using cold wallets | |
Adams et al. | Understanding PKI: concepts, standards, and deployment considerations | |
Woo et al. | Authentication for distributed systems | |
Fumy et al. | Principles of key management | |
RU2325693C2 (en) | Methods of authentication of potentials members, which were invited to join the group | |
US8290161B2 (en) | Incorporating shared randomness into distributed cryptography | |
US20110302412A1 (en) | Pseudonymous public keys based authentication | |
JP2006511104A (en) | Encryption method and encryption apparatus for secure authentication | |
US20020076052A1 (en) | Incorporating shared randomness into distributed cryptography | |
Zeydan et al. | Enhanced security with quantum key distribution and blockchain for digital identities | |
CN114826702B (en) | Database access password encryption method and device and computer equipment | |
Frederiksen et al. | Attribute-based single sign-on: Secure, private, and efficient | |
Wahab | Privacy in blockchain systems | |
Kelsey et al. | TMPS: ticket-mediated password strengthening | |
Dziembowski et al. | Password-protected threshold signatures | |
Wang | Improving information system security through removing single point of attack | |
Liu et al. | MetaL: A Fully Decentralized User-Driven Access Control Scheme for Metaverse Utilizing MC-ABE and Sharding Blockchain | |
Beurdouche et al. | RFC 9750: The Messaging Layer Security (MLS) Architecture | |
Meister et al. | Password-less key recovery via multi-factor multi-party authentication | |
Benson | Portable security transaction protocol | |
Alireza | Client/server security and off-line guessing | |
Ganesan | Yaksha: Towards reusable security infrastructures | |
Chawla | Registration and Authentication Protocol for OCEAN:(Open Computation Exchange and Auctioning Network) |