Chaturvedi et al., 2024 - Google Patents
Zero Trust Security Architecture for Digital Privacy in HealthcareChaturvedi et al., 2024
- Document ID
- 11523753209889539804
- Author
- Chaturvedi I
- Pawar P
- Muthalagu R
- Tamizharasan P
- Publication year
- Publication venue
- Information Technology Security: Modern Trends and Challenges
External Links
Snippet
Ensuring the security and privacy of confidential medical data has become increasingly crucial with the widespread digitization of healthcare institutions. This chapter proposes the adoption of a Zero Trust Security Architecture (ZTSA) to enhance digital privacy in hospitals …
- 238000000034 method 0 abstract description 35
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6281—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Borky et al. | Protecting information with cybersecurity | |
US9948652B2 (en) | System for resource-centric threat modeling and identifying controls for securing technology resources | |
Kafi et al. | Securing financial information in the digital realm: case studies in cybersecurity for accounting data protection | |
Omotunde et al. | A comprehensive review of security measures in database systems: Assessing authentication, access control, and beyond | |
Alasmari et al. | Security & privacy challenges in IoT-based health cloud | |
Anand et al. | Data security and privacy functions in fog computing for healthcare 4.0 | |
Hassan et al. | Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks | |
US9832201B1 (en) | System for generation and reuse of resource-centric threat modeling templates and identifying controls for securing technology resources | |
Malik et al. | Opportunities and Challenges in New Generation Cyber Security Applications Using Artificial Intelligence, Machine Learning and Block Chain | |
Shyam et al. | Achieving Cloud Security Solutions through Machine and Non-Machine Learning Techniques: A Survey. | |
Chaturvedi et al. | Zero Trust Security Architecture for Digital Privacy in Healthcare | |
Spasic et al. | Security Pattern for Cloud SaaS: from system and data security to privacy | |
Hutchings et al. | Criminals in the cloud: Crime, security threats, and prevention measures | |
Kujo | Implementing Zero Trust Architecture for Identities and Endpoints with Microsoft tools | |
Rajesh Kanna et al. | Exploring the landscape of network security: a comparative analysis of attack detection strategies | |
Shyam et al. | Machine vs Non-Machine Learning Approaches to Cloud Security Solutions: A Survey | |
Pero et al. | Implementing a zero trust environmentfor an existing on-premises cloud solution | |
Palanisamy | Users’ attitude on perceived security of enterprise systems mobility: a conceptual model | |
Javed et al. | Study on cybersecurity | |
Sailakshmi | Analysis of Cloud Security Controls in AWS, Azure, and Google Cloud | |
Alsmadi et al. | IT Risk and Security Management | |
Vashishth et al. | Security and Privacy Considerations in Cloud-Based Data Processing Solutions for Sensitive Data | |
Rahaman et al. | Infrastructure and Network Security | |
Kim et al. | A Study on the Security Requirements Analysis to build a Zero Trust-based Remote Work Environment | |
Isaac et al. | AI Product Security: A Primer for Developers |