Koot, 2020 - Google Patents
Introduction to Access Control (v4)Koot, 2020
View HTML- Document ID
- 12397886138662765211
- Author
- Koot A
- Publication year
- Publication venue
- IDPro Body of Knowledge
External Links
Snippet
As the name implies, Identity and Access Management (IAM) is split into two functions: managing identity information and performing access control. Arguably, if there was no access control requirement there would be no need for identity management. It is therefore …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6281—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Younis et al. | An access control model for cloud computing | |
| CN110352428B (en) | Delegating security policy management rights to a management account | |
| CN101512962B (en) | Delegation of Control Authority | |
| Park et al. | The UCONABC usage control model | |
| US12292987B2 (en) | Methods and systems for purpose-based access control | |
| CN105122263A (en) | Orchestrated interaction in access control evaluation | |
| JP2012138078A (en) | Method, system, and computer program for enabling granular discretionary access control for data stored in cloud computing environment | |
| CN101512504A (en) | Secure authorization queries | |
| Mon et al. | The privacy-aware access control system using attribute-and role-based access control in private cloud | |
| JP2009522694A (en) | Managing user access to objects | |
| Riad et al. | AR-ABAC: a new attribute based access control model supporting attribute-rules for cloud computing | |
| Pramanik et al. | Security policies to mitigate insider threat in the document control domain | |
| Hasani et al. | Criteria specifications for the comparison and evaluation of access control models | |
| Yaqub et al. | Blockchain enabled policy-based access control mechanism to restrict unauthorized access to electronic health records | |
| US20140380423A1 (en) | System and method for dynamically awarding permissions | |
| Ghazinour et al. | An autonomous model to enforce security policies based on user's behavior | |
| Poniszewska-Maranda et al. | Access control approach in development of mobile applications | |
| De Capitani di Vimercati et al. | Authorization and access control | |
| Koot | Introduction to Access Control (v4) | |
| Moravcik et al. | Overview of Access Control Mechanisms in Cloud Environments | |
| Mohamed et al. | Authorization strategies and classification of access control models | |
| Mollakuqe et al. | Comparative analysis of identity management, access control, and authorization practices in public and private universities | |
| Moe et al. | Effective security and access control framework for multilevel organizations | |
| Salim et al. | Towards authorisation models for secure information sharing: A survey and research agenda | |
| KR20100024781A (en) | Architecture and method of data access control in pervasive environment |