Ulybyshev, 2019 - Google Patents
Data protection in transit and at rest with leakage detectionUlybyshev, 2019
View PDF- Document ID
- 2789745923392965947
- Author
- Ulybyshev D
- Publication year
External Links
Snippet
In service-oriented architecture, services can communicate and share data among themselves. This thesis presents a solution that allows detecting several types of data leakages made by authorized insiders to unauthorized services. My solution provides role …
- 238000001514 detection method 0 title description 67
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN114586315B (en) | Systems, methods, and computer readable media for decentralised data authentication | |
Verma et al. | Applications of Data Security and Blockchain in Smart City Identity Management | |
Thwin et al. | Blockchain‐based access control model to preserve privacy for personal health record systems | |
Desjardins et al. | DICOM images have been hacked! Now what? | |
Thilakanathan et al. | Secure data sharing in the cloud | |
US11924332B2 (en) | Cryptographic systems and methods using distributed ledgers | |
US20110276490A1 (en) | Security service level agreements with publicly verifiable proofs of compliance | |
Mashima et al. | Enhancing accountability of electronic health record usage via patient-centric monitoring | |
JP2012518330A (en) | Reliable cloud computing and cloud service framework | |
Yan et al. | Integrity audit of shared cloud data with identity tracking | |
US20250038954A1 (en) | Cryptographic cipher for healthcare compliant data transactions | |
Ding et al. | Bloccess: enabling fine-grained access control based on blockchain | |
Jordan et al. | Viceroy: Gdpr-/ccpa-compliant enforcement of verifiable accountless consumer requests | |
Alansari | A blockchain-based approach for secure, transparent and accountable personal data sharing | |
Sharma et al. | MapSafe: A complete tool for achieving geospatial data sovereignty | |
Ghanmi et al. | Blockchain‐cloud integration: comprehensive survey and open research issues | |
Popa | Confidential Computing or Cryptographic Computing? Tradeoffs between cryptography and hardware enclaves | |
Ulybyshev | Data protection in transit and at rest with leakage detection | |
Ulybyshev et al. | Secure data exchange and data leakage detection in an untrusted cloud | |
Tsai et al. | Data encryption method using environmental secret key with server assistance | |
Wang et al. | Security Enhancements for Data‐Driven Systems: A Blockchain‐Based Trustworthy Data Sharing Scheme | |
Gan et al. | Blockchain-Assisted Electronic Medical Data-Sharing: Developments, Approaches and Perspectives. | |
Beleuta | Data privacy and security in Business Intelligence and Analytics | |
BOOK et al. | Cyber Security | |
Ndri | The applications of blockchain to cybersecurity |