Calbimonte et al., 2014 - Google Patents
Privacy and security framework. OpenIoT deliverable D522Calbimonte et al., 2014
View PDF- Document ID
- 3066908578978139665
- Author
- Calbimonte J
- Riahi M
- Zaslavsky A
- Publication year
External Links
Snippet
This deliverable describes the Security and Privacy Framework of the OpenIoT platform, including details about its design and implementation. The aim of this framework is to ensure that Internet-Connected Objects (ICOs) contributing to the OpenIoT platform, its internal …
- 235000010956 sodium stearoyl-2-lactylate 0 description 26
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11483143B2 (en) | Enhanced monitoring and protection of enterprise data | |
KR102116399B1 (en) | Content security at the service layer | |
JP5860815B2 (en) | System and method for enforcing computer policy | |
US12003634B2 (en) | Systems and methods for encrypted content management | |
RU2307391C2 (en) | Method for remote changing of communication password | |
US9973481B1 (en) | Envelope-based encryption method | |
US10033703B1 (en) | Pluggable cipher suite negotiation | |
KR20060100920A (en) | Trusted third party authentication for web services | |
US11218317B1 (en) | Secure enclave implementation of proxied cryptographic keys | |
EP4096160A1 (en) | Shared secret implementation of proxied cryptographic keys | |
CN113411187A (en) | Identity authentication method and system, storage medium and processor | |
Shingala | Json web token (jwt) based client authentication in message queuing telemetry transport (mqtt) | |
EP4145763A1 (en) | Exporting remote cryptographic keys | |
Das et al. | A decentralized open web cryptographic standard | |
Beuchelt | Securing Web applications, services, and servers | |
Baka et al. | SSL/TLS under lock and key: a guide to understanding SSL/TLS cryptography | |
Sudhakar | Techniques for securing rest | |
Calbimonte et al. | Privacy and security framework. OpenIoT deliverable D522 | |
Jain | “Sec-KeyD” an efficient key distribution protocol for critical infrastructures | |
Gilchrist | The Concise Guide to SSL/TLS for DevOps | |
Weber et al. | How to Prevent Misuse of IoTAG? | |
Bourdoucen | Securing Communication Channels in IoT using an Android Smart Phone | |
ALnwihel et al. | A Novel Cloud Authentication Framework | |
Hlushko | Privacy Monitor | |
Randhawa | Security and Trust |