[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Rech et al., 2019 - Google Patents

A decentralized service-platform towards cross-domain entitlement handling

Rech et al., 2019

View PDF
Document ID
17151836556879731998
Author
Rech A
Steger C
Pistauer M
Publication year
Publication venue
2019 IEEE International Conference on Blockchain (Blockchain)

External Links

Snippet

As our world is becoming increasingly connected, secure and seamless cross-domain access to heterogeneous services is becoming more and more important. However, cooperation between client-server based systems in the sales domain is often difficult to …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6281Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards

Similar Documents

Publication Publication Date Title
US20230091605A1 (en) Accessing an internet of things device using blockchain metadata
Lesavre et al. A taxonomic approach to understanding emerging blockchain identity management systems
Bhaskaran et al. Double-blind consent-driven data sharing on blockchain
KR102009160B1 (en) Information trust engine system based on block-chain
Ahmed et al. Blockchain-based identity management system and self-sovereign identity ecosystem: A comprehensive survey
CN111316278B (en) Secure identity and profile management system
Yawalkar et al. Integrated identity and auditing management using blockchain mechanism
Windley Digital Identity: Unmasking identity management architecture (IMA)
Bertino et al. Identity management: Concepts, technologies, and systems
US20210377045A1 (en) Method, apparatus, and computer-readable medium for authentication and authorization of networked data transactions
US20180336554A1 (en) Secure electronic transaction authentication
CN101937528A (en) Systems and methods for implementing supply chain visibility policies
Kwame et al. V-chain: A blockchain-based car lease platform
US20240005316A1 (en) Method, apparatus, and computer-readable medium for authentication and authorization of networked data transactions
Nabi Comparative study on identity management methods using blockchain
Guo et al. Using blockchain to control access to cloud data
Alboaie et al. Secret smart contracts in hierarchical blockchains
Janani et al. A security framework to enhance IoT device identity and data access through blockchain consensus model
Russo et al. A system to access online services with minimal personal information disclosure
Chadwick et al. Openid for verifiable credentials
Rech et al. A decentralized service-platform towards cross-domain entitlement handling
Alpár Attribute-based identity management:[bridging the cryptographic design of ABCs with the real world]
Millenaar et al. The case for a unified identity
CN115021959A (en) Block chain-based data management method and related product
Hussain The Design and Applications of a Privacy-Preserving Identity and Trust-Management System