[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Li-hua et al., 2007 - Google Patents

Research on a security model of data in computer supported collaborative design integrated with PDM system

Li-hua et al., 2007

Document ID
10005556556031093939
Author
Li-hua Y
Jian S
Guo-qiang S
Guo-xuan Z
Publication year
Publication venue
Workshop on Intelligent Information Technology Application (IITA 2007)

External Links

Snippet

A new security model of product data in computer supported collaborative design integrated with the product data management (PDM) is presented. The security of system is realized by several methods like user login, user and access control management, collaborative …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Similar Documents

Publication Publication Date Title
Yang et al. AuthPrivacyChain: A blockchain-based access control framework with privacy protection in cloud
US10348700B2 (en) Verifiable trust for data through wrapper composition
US9380036B2 (en) Methods and devices for securing keys for a nonsecured, distributed environment with applications to virtualization and cloud-computing security and management
Sauber et al. A new secure model for data protection over cloud computing
Vegesna Investigations on different security techniques for data protection in cloud computing using cryptography schemes
Gajmal et al. Blockchain-based access control and data sharing mechanism in cloud decentralized storage system
Lu et al. Secure and real-time traceable data sharing in cloud-assisted IoT
Poongodi et al. Enhancing iot data security with blockchain based inner product encryption algorithm
CN113901507B (en) Multi-party resource processing method and privacy computing system
CN112307508A (en) Revocable data sharing system based on SGX, CP-ABE and block chain
Roslin Dayana et al. Trust aware cryptographic role based access control scheme for secure cloud data storage
Li-hua et al. Research on a security model of data in computer supported collaborative design integrated with PDM system
CN117278269A (en) Sensitive data encryption sharing method and system based on attribute conditional proxy re-encryption
Neela DSDOS Cloud: A Decentralized Secure Data Outsourcing System With Hybrid Encryption, Blockchain Smart Contract‐Based Access Control, and Hash Authentication Codes for Cloud Security
Agarwal et al. A safe and resilient cryptographic system for dynamic cloud groups with secure data sharing and efficient user revocation
Senthilkumar et al. HB-PPAC: hierarchy-based privacy preserving access control technique in public cloud
Priya et al. A survey: attribute based encryption for secure cloud
Shaheen et al. Fortifying Multi-User Cloud Security in Quantum Networking Using Cryptographic Algorithms
Kaushik et al. Cloud computing security: attacks, threats, risk and solutions
Kodada et al. FSACE: finite state automata-based client-side encryption for secure data deduplication in cloud computing
Tian Zero trust anonymous access algorithm for multi cloud storage system based on CP-ABE
Sauber et al. Research Article A New Secure Model for Data Protection over Cloud Computing
Chaturvedi et al. Security Algorithms for Privacy Protection and Security in Aadhaar
Samrin et al. A Framework for Data Security and Sharing in Cloud Computing Environments by Using Cryptographic Algorithms
Baghel et al. Multilevel security model for cloud third-party authentication