Rech et al., 2019 - Google Patents
A decentralized service-platform towards cross-domain entitlement handlingRech et al., 2019
View PDF- Document ID
- 17151836556879731998
- Author
- Rech A
- Steger C
- Pistauer M
- Publication year
- Publication venue
- 2019 IEEE International Conference on Blockchain (Blockchain)
External Links
Snippet
As our world is becoming increasingly connected, secure and seamless cross-domain access to heterogeneous services is becoming more and more important. However, cooperation between client-server based systems in the sales domain is often difficult to …
- 238000000034 method 0 abstract description 19
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6281—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230091605A1 (en) | Accessing an internet of things device using blockchain metadata | |
Lesavre et al. | A taxonomic approach to understanding emerging blockchain identity management systems | |
Bhaskaran et al. | Double-blind consent-driven data sharing on blockchain | |
KR102009160B1 (en) | Information trust engine system based on block-chain | |
Ahmed et al. | Blockchain-based identity management system and self-sovereign identity ecosystem: A comprehensive survey | |
CN111316278B (en) | Secure identity and profile management system | |
Yawalkar et al. | Integrated identity and auditing management using blockchain mechanism | |
Windley | Digital Identity: Unmasking identity management architecture (IMA) | |
Bertino et al. | Identity management: Concepts, technologies, and systems | |
US20210377045A1 (en) | Method, apparatus, and computer-readable medium for authentication and authorization of networked data transactions | |
US20180336554A1 (en) | Secure electronic transaction authentication | |
CN101937528A (en) | Systems and methods for implementing supply chain visibility policies | |
Kwame et al. | V-chain: A blockchain-based car lease platform | |
US20240005316A1 (en) | Method, apparatus, and computer-readable medium for authentication and authorization of networked data transactions | |
Nabi | Comparative study on identity management methods using blockchain | |
Guo et al. | Using blockchain to control access to cloud data | |
Alboaie et al. | Secret smart contracts in hierarchical blockchains | |
Janani et al. | A security framework to enhance IoT device identity and data access through blockchain consensus model | |
Russo et al. | A system to access online services with minimal personal information disclosure | |
Chadwick et al. | Openid for verifiable credentials | |
Rech et al. | A decentralized service-platform towards cross-domain entitlement handling | |
Alpár | Attribute-based identity management:[bridging the cryptographic design of ABCs with the real world] | |
Millenaar et al. | The case for a unified identity | |
CN115021959A (en) | Block chain-based data management method and related product | |
Hussain | The Design and Applications of a Privacy-Preserving Identity and Trust-Management System |