Abdallah et al., 2017 - Google Patents
TRUST-CAP: A trust model for cloud-based applicationsAbdallah et al., 2017
- Document ID
- 13100722729250671948
- Author
- Abdallah E
- Zulkernine M
- Gu Y
- Liem C
- Publication year
- Publication venue
- 2017 IEEE 41st annual computer software and applications conference (COMPSAC)
External Links
Snippet
Cloud computing provides an opportunity for individuals and organizations to extend their capabilities by offering elastic computing resources. Trust is a major challenge in cloud computing. With trust, cloud users (trustees) can select the best available resources from …
- 230000006399 behavior 0 abstract description 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shafiq et al. | The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT‐Based Security Attacks | |
Chou | Security threats on cloud computing vulnerabilities | |
Langer | Cyber-security issues in healthcare information technology | |
Abdallah et al. | TRUST-CAP: A trust model for cloud-based applications | |
Khalil et al. | Consolidated Identity Management System for secure mobile cloud computing | |
AL-Hawamleh | Predictions of cybersecurity experts on future cyber-attacks and related cybersecurity measures | |
Hutchings et al. | Cloud computing for small business: Criminal and security threats and prevention measures | |
Alosaimi et al. | An enhanced economical denial of sustainability mitigation system for the cloud | |
Chimuco et al. | Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation | |
Shajan et al. | Survey of security threats and countermeasures in cloud computing | |
Kumar et al. | A Survey on Cloud Computing Security Threats, Attacks and Countermeasures: A Review | |
Pattnaik et al. | Security Paradigms in Cloud Computing | |
Aich et al. | Study on cloud security risk and remedy | |
Malomo et al. | A survey on recent advances in cloud computing security | |
Alotaibi et al. | Mobile computing security: issues and requirements | |
Sung et al. | Security analysis of mobile authentication using qr-codes | |
Hensley | Identity is the new perimeter in the fight against supply chain attacks | |
Victoire et al. | A Survey on Cyber Security Threats and its Impact on Society | |
Hutchings et al. | Criminals in the cloud: Crime, security threats, and prevention measures | |
Chhabra et al. | Cloud computing: towards risk assessment | |
Droppa et al. | Analysis of cybersecurity in the real environment | |
Eldewahi et al. | The analysis of MATE attack in SDN based on STRIDE model | |
Jagannath et al. | Browser‐in‐the‐middle attacks: A comprehensive analysis and countermeasures | |
Kujo | Implementing Zero Trust Architecture for Identities and Endpoints with Microsoft tools | |
Alwahedi et al. | Security in mobile computing: attack vectors, solutions, and challenges |