[go: up one dir, main page]

Chakrabarti, 2007 - Google Patents

Grid Information Security Architecture

Chakrabarti, 2007

Document ID
2724983714238289391
Author
Chakrabarti A
Publication year
Publication venue
Grid Computing Security

External Links

Snippet

There are many possible definitions of information security. One such definition can be found in the paper by McDaniel et al., which states that it is “The concepts, techniques, technical measures, and administrative measures used to protect the information assets …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2145Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy

Similar Documents

Publication Publication Date Title
CN109936569B (en) Decentralized digital identity login management system based on Ether house block chain
US11855767B2 (en) Methods and systems for distributing encrypted cryptographic data
Chakrabarti Grid computing security
Lopez et al. Authentication and authorization infrastructures (AAIs): a comparative survey
Humphrey et al. Security for grids
US7487539B2 (en) Cross domain authentication and security services using proxies for HTTP access
US9137017B2 (en) Key recovery mechanism
Geer Taking steps to secure web services
US20080263644A1 (en) Federated authorization for distributed computing
US20110296171A1 (en) Key recovery mechanism
KR20050054081A (en) Integrated security information management system and its method
CN101552784A (en) Combined identity certification method of Web service chain
CN100399739C (en) A Method of Realizing Trust Authentication Based on Negotiation Communication
US10979396B2 (en) Augmented design for a triple blinded identity system
CN101296230A (en) Web Service Security Control Mechanism Based on PKI and PMI
Zhang Integrated security framework for secure web services
US9219715B2 (en) Mediator utilizing electronic content to enforce policies to a resource
Selkirk Using XML security mechanisms
Zwattendorfer et al. Privacy-preserving realization of the STORK framework in the public cloud
Lock et al. Grid Security and its use of X. 509 Certificates
Chakrabarti Grid Information Security Architecture
Meduri Webservice security
Chapman et al. OMII Grid Security Technology Overview
Sultan et al. Overcoming Barriers to Client-Side Digital Certificate Adoption
Simpson et al. Claims-Based Authentication for an Enterprise that Uses Web Services