Li et al., 2015 - Google Patents
Robust access control framework for mobile cloud computing networkLi et al., 2015
View PDF- Document ID
- 18102065755360362484
- Author
- Li F
- Rahulamathavan Y
- Conti M
- Rajarajan M
- Publication year
- Publication venue
- Computer Communications
External Links
Snippet
Unified communications has enabled seamless data sharing between multiple devices running on various platforms. Traditionally, organizations use local servers to store data and employees access the data using desktops with predefined security policies. In the era of …
- 238000000034 method 0 abstract description 24
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
- G06F1/26—Power supply means, e.g. regulation thereof
- G06F1/32—Means for saving power
- G06F1/3203—Power Management, i.e. event-based initiation of power-saving mode
- G06F1/3234—Action, measure or step performed to reduce power consumption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
- G06F1/26—Power supply means, e.g. regulation thereof
- G06F1/32—Means for saving power
- G06F1/3203—Power Management, i.e. event-based initiation of power-saving mode
- G06F1/3206—Monitoring a parameter, a device or an event triggering a change in power modality
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | Robust access control framework for mobile cloud computing network | |
Liu et al. | A survey on secure data analytics in edge computing | |
Yousefnezhad et al. | Security in product lifecycle of IoT devices: A survey | |
Harbi et al. | A review of security in internet of things | |
Jayaraman et al. | Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation | |
Ferrag et al. | Privacy-preserving schemes for ad hoc social networks: A survey | |
Zhang et al. | Privacy-preserving contact tracing in 5G-integrated and blockchain-based medical applications | |
Kalaria et al. | A Secure Mutual authentication approach to fog computing environment | |
Agrawal et al. | A trustworthy agent-based encrypted access control method for mobile cloud computing environment | |
Qiao et al. | Compulsory traceable ciphertext-policy attribute-based encryption against privilege abuse in fog computing | |
Park et al. | A selective group authentication scheme for IoT-based medical information system | |
Hasan et al. | WORAL: A witness oriented secure location provenance framework for mobile devices | |
Kotha et al. | A comprehensive review on secure data sharing in cloud environment | |
Zheng et al. | An adaptive access control scheme based on trust degrees for edge computing | |
Badar et al. | Secure authentication protocol for home area network in smart grid-based smart cities | |
Junejo et al. | A Lightweight Attribute‐Based Security Scheme for Fog‐Enabled Cyber Physical Systems | |
Li et al. | LSD-ABAC: Lightweight static and dynamic attributes based access control scheme for secure data access in mobile environment | |
SC et al. | Secure session key pairing and a lightweight key authentication scheme for liable drone services | |
Yan et al. | Heterogeneous data access control based on trust and reputation in mobile cloud computing | |
Belguith et al. | Coop-daab: Cooperative attribute based data aggregation for internet of things applications | |
Ma et al. | Edge computing assisted an efficient privacy protection layered data aggregation scheme for IIoT | |
Tsai et al. | Secure data-sharing using distributed environmental matching keys | |
Chatterjee et al. | A survey on user access control in wireless sensor networks with formal security verification | |
Mohammedi et al. | Energy-aware key management and access control for the internet of things | |
Zhang et al. | Multidomain security authentication for the Internet of things |