[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Chaturvedi et al., 2024 - Google Patents

Zero Trust Security Architecture for Digital Privacy in Healthcare

Chaturvedi et al., 2024

Document ID
11523753209889539804
Author
Chaturvedi I
Pawar P
Muthalagu R
Tamizharasan P
Publication year
Publication venue
Information Technology Security: Modern Trends and Challenges

External Links

Snippet

Ensuring the security and privacy of confidential medical data has become increasingly crucial with the widespread digitization of healthcare institutions. This chapter proposes the adoption of a Zero Trust Security Architecture (ZTSA) to enhance digital privacy in hospitals …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6281Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards

Similar Documents

Publication Publication Date Title
Borky et al. Protecting information with cybersecurity
US9948652B2 (en) System for resource-centric threat modeling and identifying controls for securing technology resources
Kafi et al. Securing financial information in the digital realm: case studies in cybersecurity for accounting data protection
Omotunde et al. A comprehensive review of security measures in database systems: Assessing authentication, access control, and beyond
Alasmari et al. Security & privacy challenges in IoT-based health cloud
Anand et al. Data security and privacy functions in fog computing for healthcare 4.0
Hassan et al. Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks
US9832201B1 (en) System for generation and reuse of resource-centric threat modeling templates and identifying controls for securing technology resources
Malik et al. Opportunities and Challenges in New Generation Cyber Security Applications Using Artificial Intelligence, Machine Learning and Block Chain
Shyam et al. Achieving Cloud Security Solutions through Machine and Non-Machine Learning Techniques: A Survey.
Chaturvedi et al. Zero Trust Security Architecture for Digital Privacy in Healthcare
Spasic et al. Security Pattern for Cloud SaaS: from system and data security to privacy
Hutchings et al. Criminals in the cloud: Crime, security threats, and prevention measures
Kujo Implementing Zero Trust Architecture for Identities and Endpoints with Microsoft tools
Rajesh Kanna et al. Exploring the landscape of network security: a comparative analysis of attack detection strategies
Shyam et al. Machine vs Non-Machine Learning Approaches to Cloud Security Solutions: A Survey
Pero et al. Implementing a zero trust environmentfor an existing on-premises cloud solution
Palanisamy Users’ attitude on perceived security of enterprise systems mobility: a conceptual model
Javed et al. Study on cybersecurity
Sailakshmi Analysis of Cloud Security Controls in AWS, Azure, and Google Cloud
Alsmadi et al. IT Risk and Security Management
Vashishth et al. Security and Privacy Considerations in Cloud-Based Data Processing Solutions for Sensitive Data
Rahaman et al. Infrastructure and Network Security
Kim et al. A Study on the Security Requirements Analysis to build a Zero Trust-based Remote Work Environment
Isaac et al. AI Product Security: A Primer for Developers