[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Han, 2022 - Google Patents

Sharing confidential documents management system for multiuser

Han, 2022

Document ID
14034725980939843595
Author
Han S
Publication year
Publication venue
2022 IEEE/ACIS 7th International Conference on Big Data, Cloud Computing, and Data Science (BCD)

External Links

Snippet

In an enterprise environment, various types of information are distributed. Information to be distributed can be distributed in text, audio, or video types, but the most basic distribution unit is a document file. Some organizations may distribute confidential information by storing …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Similar Documents

Publication Publication Date Title
AU2008341026B2 (en) System and method for securing data
US8799651B2 (en) Method and system for encrypted file access
US10666647B2 (en) Access to data stored in a cloud
CN102394894A (en) Network virtual disk file safety management method based on cloud computing
US20130152160A1 (en) Systems and methods for using cipher objects to protect data
JP2012518329A (en) A framework for trusted cloud computing and services
CA2714196A1 (en) Information distribution system and program for the same
CN114175580B (en) Enhanced secure encryption and decryption system
CA3133947A1 (en) Cryptographic systems
US20140047557A1 (en) Providing access of digital contents to online drm users
US10417448B2 (en) Management of sensitive information access and use
Han Sharing confidential documents management system for multiuser
Zhang et al. Cloud shredder: Removing the laptop on-road data disclosure threat in the cloud computing era
EP3227822A1 (en) Secure document management
Alawneh et al. Sharing but protecting content against internal leakage for organisations
KR20170053459A (en) Encryption and decryption method for protecting information
Hoepman et al. Offering'Home'Protection to Private Digital Storage Spaces
Agarkhed et al. Data De-duplication Scheme for File Checksum in Cloud
Pokale et al. De-duplication Approach with Enhance Security for Integrity
Han Confidential Documents Sharing Model Based on Blockchain Environment
KR101387939B1 (en) System for controlling backup storage
KR20240066716A (en) Method for managing content decryption key and apparatus for same
Yongze et al. Research on strategies of information anti-disclosure in PDM system
Sreenivasulu et al. Implementation of Authorized Deduplication in Hybrid Cloud Computing Model
Sayler Securing and Managing Trust in Modern Computing Applications