[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Abdallah et al., 2017 - Google Patents

TRUST-CAP: A trust model for cloud-based applications

Abdallah et al., 2017

Document ID
13100722729250671948
Author
Abdallah E
Zulkernine M
Gu Y
Liem C
Publication year
Publication venue
2017 IEEE 41st annual computer software and applications conference (COMPSAC)

External Links

Snippet

Cloud computing provides an opportunity for individuals and organizations to extend their capabilities by offering elastic computing resources. Trust is a major challenge in cloud computing. With trust, cloud users (trustees) can select the best available resources from …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect

Similar Documents

Publication Publication Date Title
Shafiq et al. The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT‐Based Security Attacks
Chou Security threats on cloud computing vulnerabilities
Langer Cyber-security issues in healthcare information technology
Abdallah et al. TRUST-CAP: A trust model for cloud-based applications
Khalil et al. Consolidated Identity Management System for secure mobile cloud computing
AL-Hawamleh Predictions of cybersecurity experts on future cyber-attacks and related cybersecurity measures
Hutchings et al. Cloud computing for small business: Criminal and security threats and prevention measures
Alosaimi et al. An enhanced economical denial of sustainability mitigation system for the cloud
Chimuco et al. Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation
Shajan et al. Survey of security threats and countermeasures in cloud computing
Kumar et al. A Survey on Cloud Computing Security Threats, Attacks and Countermeasures: A Review
Pattnaik et al. Security Paradigms in Cloud Computing
Aich et al. Study on cloud security risk and remedy
Malomo et al. A survey on recent advances in cloud computing security
Alotaibi et al. Mobile computing security: issues and requirements
Sung et al. Security analysis of mobile authentication using qr-codes
Hensley Identity is the new perimeter in the fight against supply chain attacks
Victoire et al. A Survey on Cyber Security Threats and its Impact on Society
Hutchings et al. Criminals in the cloud: Crime, security threats, and prevention measures
Chhabra et al. Cloud computing: towards risk assessment
Droppa et al. Analysis of cybersecurity in the real environment
Eldewahi et al. The analysis of MATE attack in SDN based on STRIDE model
Jagannath et al. Browser‐in‐the‐middle attacks: A comprehensive analysis and countermeasures
Kujo Implementing Zero Trust Architecture for Identities and Endpoints with Microsoft tools
Alwahedi et al. Security in mobile computing: attack vectors, solutions, and challenges