Han, 2022 - Google Patents
Sharing confidential documents management system for multiuserHan, 2022
- Document ID
- 14034725980939843595
- Author
- Han S
- Publication year
- Publication venue
- 2022 IEEE/ACIS 7th International Conference on Big Data, Cloud Computing, and Data Science (BCD)
External Links
Snippet
In an enterprise environment, various types of information are distributed. Information to be distributed can be distributed in text, audio, or video types, but the most basic distribution unit is a document file. Some organizations may distribute confidential information by storing …
- 238000000034 method 0 abstract description 13
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2008341026B2 (en) | System and method for securing data | |
US8799651B2 (en) | Method and system for encrypted file access | |
US10666647B2 (en) | Access to data stored in a cloud | |
CN102394894A (en) | Network virtual disk file safety management method based on cloud computing | |
US20130152160A1 (en) | Systems and methods for using cipher objects to protect data | |
JP2012518329A (en) | A framework for trusted cloud computing and services | |
CA2714196A1 (en) | Information distribution system and program for the same | |
CN114175580B (en) | Enhanced secure encryption and decryption system | |
CA3133947A1 (en) | Cryptographic systems | |
US20140047557A1 (en) | Providing access of digital contents to online drm users | |
US10417448B2 (en) | Management of sensitive information access and use | |
Han | Sharing confidential documents management system for multiuser | |
Zhang et al. | Cloud shredder: Removing the laptop on-road data disclosure threat in the cloud computing era | |
EP3227822A1 (en) | Secure document management | |
Alawneh et al. | Sharing but protecting content against internal leakage for organisations | |
KR20170053459A (en) | Encryption and decryption method for protecting information | |
Hoepman et al. | Offering'Home'Protection to Private Digital Storage Spaces | |
Agarkhed et al. | Data De-duplication Scheme for File Checksum in Cloud | |
Pokale et al. | De-duplication Approach with Enhance Security for Integrity | |
Han | Confidential Documents Sharing Model Based on Blockchain Environment | |
KR101387939B1 (en) | System for controlling backup storage | |
KR20240066716A (en) | Method for managing content decryption key and apparatus for same | |
Yongze et al. | Research on strategies of information anti-disclosure in PDM system | |
Sreenivasulu et al. | Implementation of Authorized Deduplication in Hybrid Cloud Computing Model | |
Sayler | Securing and Managing Trust in Modern Computing Applications |