[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Cha et al., 2023 - Google Patents

A blockchain-enabled IoT auditing management system complying with ISO/IEC 15408-2

Cha et al., 2023

Document ID
7529172650862765959
Author
Cha S
Meng W
Li W
Yeh K
Publication year
Publication venue
Computers & Industrial Engineering

External Links

Snippet

Recently, blockchain has attracted attention as one of the most promising key platform technologies for leveraging IoT (Internet of Things) security and auditing management with trusted and decentralized architecture. Therefore, the possibilities of using blockchain for …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards

Similar Documents

Publication Publication Date Title
Pasquier et al. Data provenance to audit compliance with privacy policy in the Internet of Things
Mohammad et al. Machine learning with big data analytics for cloud security
Toapanta et al. Analysis for the evaluation and security management of a database in a public organization to mitigate cyber attacks
Grimaila et al. Design and analysis of a dynamically configured log-based distributed security event detection methodology
Anand et al. Data security and privacy functions in fog computing for healthcare 4.0
Porras et al. Security in the internet of things-a systematic mapping study
Zheng et al. Smart grid: Cyber attacks, critical defense approaches, and digital twin
Cha et al. A blockchain-enabled IoT auditing management system complying with ISO/IEC 15408-2
Miloslavskaya Designing blockchain-based SIEM 3.0 system
Bezas et al. Comparative analysis of open source security information & event management systems (SIEMs)
Henriques et al. A survey on forensics and compliance auditing for critical infrastructure protection
Porras et al. Security challenges and solutions in the internet of things
Iorliam Cybersecurity in Nigeria: A Case Study of Surveillance and Prevention of Digital Crime
Fehér et al. Log file authentication and storage on blockchain network
Kamal et al. Forensics chain for evidence preservation system: An evidence preservation forensics framework for internet of things‐based smart city security using blockchain
Buecker et al. Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security
Dorigo Security information and event management
Miloslavskaya et al. Blockchain application for iot cybersecurity management
US11741409B1 (en) Compliance management system
Alexandrov et al. Design and security analysis of a fragment of internet of things telecommunication system
Karlzén An Analysis of Security Information and Event Management Systems-The Use or SIEMs for Log Collection, Management and Analysis
Al-Fedaghi et al. Events classification in log audit
Lee et al. A proposal for automating investigations in live forensics
Bitar et al. Gdpr: Securing personal data in compliance with new eu-regulations
Prowell et al. Position Papers for the ASCR Workshop on Cybersecurity and Privacy for Scientific Computing Ecosystems