Chakrabarti, 2007 - Google Patents
Grid Information Security ArchitectureChakrabarti, 2007
- Document ID
- 2724983714238289391
- Author
- Chakrabarti A
- Publication year
- Publication venue
- Grid Computing Security
External Links
Snippet
There are many possible definitions of information security. One such definition can be found in the paper by McDaniel et al., which states that it is “The concepts, techniques, technical measures, and administrative measures used to protect the information assets …
- 238000000034 method 0 abstract description 10
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2145—Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109936569B (en) | Decentralized digital identity login management system based on Ether house block chain | |
US11855767B2 (en) | Methods and systems for distributing encrypted cryptographic data | |
Chakrabarti | Grid computing security | |
Lopez et al. | Authentication and authorization infrastructures (AAIs): a comparative survey | |
Humphrey et al. | Security for grids | |
US7487539B2 (en) | Cross domain authentication and security services using proxies for HTTP access | |
US9137017B2 (en) | Key recovery mechanism | |
Geer | Taking steps to secure web services | |
US20080263644A1 (en) | Federated authorization for distributed computing | |
US20110296171A1 (en) | Key recovery mechanism | |
KR20050054081A (en) | Integrated security information management system and its method | |
CN101552784A (en) | Combined identity certification method of Web service chain | |
CN100399739C (en) | A Method of Realizing Trust Authentication Based on Negotiation Communication | |
US10979396B2 (en) | Augmented design for a triple blinded identity system | |
CN101296230A (en) | Web Service Security Control Mechanism Based on PKI and PMI | |
Zhang | Integrated security framework for secure web services | |
US9219715B2 (en) | Mediator utilizing electronic content to enforce policies to a resource | |
Selkirk | Using XML security mechanisms | |
Zwattendorfer et al. | Privacy-preserving realization of the STORK framework in the public cloud | |
Lock et al. | Grid Security and its use of X. 509 Certificates | |
Chakrabarti | Grid Information Security Architecture | |
Meduri | Webservice security | |
Chapman et al. | OMII Grid Security Technology Overview | |
Sultan et al. | Overcoming Barriers to Client-Side Digital Certificate Adoption | |
Simpson et al. | Claims-Based Authentication for an Enterprise that Uses Web Services |