[go: up one dir, main page]

Marian et al., 2023 - Google Patents

Requirements Analysis for a System for Certifying Online Content

Marian et al., 2023

Document ID
3001973965670819252
Author
Marian M
Stîngă F
Cusman A
Ganea E
Popescu D
Ionică D
Publication year
Publication venue
2023 24th International Carpathian Control Conference (ICCC)

External Links

Snippet

This paper investigates the requirements for a system capable to authenticate (or certify) the content that is available online. Based on an analysis of the approaches used to fight against fake news and fake online content, our proposal is based on digital signatures, and …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2119Authenticating web pages, e.g. with suspicious links
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers

Similar Documents

Publication Publication Date Title
CN112292682B (en) Decentralized document and entity verification engine
US11757641B2 (en) Decentralized data authentication
US11575522B2 (en) Short-duration digital certificate issuance based on long-duration digital certificate validation
US20120290847A1 (en) System and method for reliably preserving web-based evidence
Fairweather et al. Non-repudiable provenance for clinical decision support systems
Bichsel et al. An architecture for privacy-ABCs
Pangan et al. Authenticating data transfer using RSA-Generated QR Codes
Marian et al. Requirements Analysis for a System for Certifying Online Content
EP3883204B1 (en) System and method for secure generation, exchange and management of a user identity data using a blockchain
Al-Sinani et al. CardSpace-Liberty integration for CardSpace users
US12105842B1 (en) Verifiable credentialling and message content provenance authentication
Aljawarneh et al. Security policy framework and algorithms for web server content protection
Marian et al. A Cloud-Based Service for Digitally Certifying Online Content
Radke Security ceremonies: including humans in cryptographic protocols
Pärni On Self-Sovereign Identity: Verifiable Credentials and Presentations with OpenID Connect
Ilchev et al. Modular data hiding for improved web-portal security
Fleisje PDF Digital Signatures: Delving Deep into the State of the State-of-the-Art
Uriawan et al. Authenticate and Verification Source Files using SHA256 and HMAC Algorithms
Gallersdörfer Public Key Infrastructures and Blockchain Systems: Utilizing Internet Public Key Infrastructures to Leverage Their Trust and Adoption in Blockchain Systems
Priyadarshini et al. A Faster, Integrated and Trusted Certificate Authentication and Issuer Validation System based on Blockchain
Gallersdörfer Public Key Infrastructures and Blockchain Systems
Costa Reducing fraud in authentication systems using attribute certificates
Esiyok Three modest proposals for building trust: in social media discourse, the software that powers it and the browsers that run the software
Satybaldy Towards Self-Sovereign Identity
Josefsson Ågren et al. Characterizing the Third-Party Authentication Landscape: A Longitudinal Study of how Identity Providers are Used in Modern Websites