Marian et al., 2023 - Google Patents
Requirements Analysis for a System for Certifying Online ContentMarian et al., 2023
- Document ID
- 3001973965670819252
- Author
- Marian M
- Stîngă F
- Cusman A
- Ganea E
- Popescu D
- Ionică D
- Publication year
- Publication venue
- 2023 24th International Carpathian Control Conference (ICCC)
External Links
Snippet
This paper investigates the requirements for a system capable to authenticate (or certify) the content that is available online. Based on an analysis of the approaches used to fight against fake news and fake online content, our proposal is based on digital signatures, and …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2119—Authenticating web pages, e.g. with suspicious links
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112292682B (en) | Decentralized document and entity verification engine | |
US11757641B2 (en) | Decentralized data authentication | |
US11575522B2 (en) | Short-duration digital certificate issuance based on long-duration digital certificate validation | |
US20120290847A1 (en) | System and method for reliably preserving web-based evidence | |
Fairweather et al. | Non-repudiable provenance for clinical decision support systems | |
Bichsel et al. | An architecture for privacy-ABCs | |
Pangan et al. | Authenticating data transfer using RSA-Generated QR Codes | |
Marian et al. | Requirements Analysis for a System for Certifying Online Content | |
EP3883204B1 (en) | System and method for secure generation, exchange and management of a user identity data using a blockchain | |
Al-Sinani et al. | CardSpace-Liberty integration for CardSpace users | |
US12105842B1 (en) | Verifiable credentialling and message content provenance authentication | |
Aljawarneh et al. | Security policy framework and algorithms for web server content protection | |
Marian et al. | A Cloud-Based Service for Digitally Certifying Online Content | |
Radke | Security ceremonies: including humans in cryptographic protocols | |
Pärni | On Self-Sovereign Identity: Verifiable Credentials and Presentations with OpenID Connect | |
Ilchev et al. | Modular data hiding for improved web-portal security | |
Fleisje | PDF Digital Signatures: Delving Deep into the State of the State-of-the-Art | |
Uriawan et al. | Authenticate and Verification Source Files using SHA256 and HMAC Algorithms | |
Gallersdörfer | Public Key Infrastructures and Blockchain Systems: Utilizing Internet Public Key Infrastructures to Leverage Their Trust and Adoption in Blockchain Systems | |
Priyadarshini et al. | A Faster, Integrated and Trusted Certificate Authentication and Issuer Validation System based on Blockchain | |
Gallersdörfer | Public Key Infrastructures and Blockchain Systems | |
Costa | Reducing fraud in authentication systems using attribute certificates | |
Esiyok | Three modest proposals for building trust: in social media discourse, the software that powers it and the browsers that run the software | |
Satybaldy | Towards Self-Sovereign Identity | |
Josefsson Ågren et al. | Characterizing the Third-Party Authentication Landscape: A Longitudinal Study of how Identity Providers are Used in Modern Websites |