[go: up one dir, main page]

Koot, 2020 - Google Patents

Introduction to Access Control (v4)

Koot, 2020

View HTML
Document ID
12397886138662765211
Author
Koot A
Publication year
Publication venue
IDPro Body of Knowledge

External Links

Snippet

As the name implies, Identity and Access Management (IAM) is split into two functions: managing identity information and performing access control. Arguably, if there was no access control requirement there would be no need for identity management. It is therefore …
Continue reading at bok.idpro.org (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6281Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Similar Documents

Publication Publication Date Title
Younis et al. An access control model for cloud computing
CN110352428B (en) Delegating security policy management rights to a management account
CN101512962B (en) Delegation of Control Authority
Park et al. The UCONABC usage control model
US12292987B2 (en) Methods and systems for purpose-based access control
CN105122263A (en) Orchestrated interaction in access control evaluation
JP2012138078A (en) Method, system, and computer program for enabling granular discretionary access control for data stored in cloud computing environment
CN101512504A (en) Secure authorization queries
Mon et al. The privacy-aware access control system using attribute-and role-based access control in private cloud
JP2009522694A (en) Managing user access to objects
Riad et al. AR-ABAC: a new attribute based access control model supporting attribute-rules for cloud computing
Pramanik et al. Security policies to mitigate insider threat in the document control domain
Hasani et al. Criteria specifications for the comparison and evaluation of access control models
Yaqub et al. Blockchain enabled policy-based access control mechanism to restrict unauthorized access to electronic health records
US20140380423A1 (en) System and method for dynamically awarding permissions
Ghazinour et al. An autonomous model to enforce security policies based on user's behavior
Poniszewska-Maranda et al. Access control approach in development of mobile applications
De Capitani di Vimercati et al. Authorization and access control
Koot Introduction to Access Control (v4)
Moravcik et al. Overview of Access Control Mechanisms in Cloud Environments
Mohamed et al. Authorization strategies and classification of access control models
Mollakuqe et al. Comparative analysis of identity management, access control, and authorization practices in public and private universities
Moe et al. Effective security and access control framework for multilevel organizations
Salim et al. Towards authorisation models for secure information sharing: A survey and research agenda
KR20100024781A (en) Architecture and method of data access control in pervasive environment