[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Dalwadi, 2006 - Google Patents

Network And Data Security

Dalwadi, 2006

View PDF
Document ID
2018303739278982719
Author
Dalwadi C
Publication year

External Links

Snippet

With a growing number of users getting connected to the Internet and given their growing reliance on computers, it has become increasingly important to protect the confidential information stored locally or on the Internet. There are people who greatly under estimate …
Continue reading at digitalcommons.library.uab.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Similar Documents

Publication Publication Date Title
US9781114B2 (en) Computer security system
US20190354709A1 (en) Enforcement of same origin policy for sensitive data
US8136149B2 (en) Security system with methodology providing verified secured individual end points
US7627896B2 (en) Security system providing methodology for cooperative enforcement of security policies during SSL sessions
US10764264B2 (en) Technique for authenticating network users
US7752320B2 (en) Method and apparatus for content based authentication for network access
US7725589B2 (en) System, method, apparatus, and computer program product for facilitating digital communications
Atashzar et al. A survey on web application vulnerabilities and countermeasures
Avolio et al. A network perimeter with secure external access
Sangster et al. Network endpoint assessment (NEA): Overview and requirements
Khandelwal et al. Frontline techniques to prevent web application vulnerability
CN116846614A (en) Trusted computing-based MQTT protocol message security processing method and system
Sagar et al. Information security: safeguarding resources and building trust
Maidine et al. Cloud Identity Management Mechanisms and Issues
WO2009005698A1 (en) Computer security system
Dalwadi Network And Data Security
Kuzminykh et al. Mechanisms of ensuring security in Keystone service
Viegas et al. IT Security Technical Controls
Sintaro et al. SDP And VPN For Remote Access: A Comparative Study And Performance Evaluation
Qureshi Analysis of Network Security Through VAPT and Network Monitoring
Harrison et al. A protocol layer survey of network security
Sarvepalli Designing Network Security Labs
Smyth Security+ Essentials
Parker et al. Numbers and Symbols
Luse Roaming user-based distributed firewalls