[go: up one dir, main page]

Pitropakis et al., 2020 - Google Patents

Cloud security, privacy and trust baselines

Pitropakis et al., 2020

Document ID
4812557273775957933
Author
Pitropakis N
Katsikas S
Lambrinoudakis C
Publication year
Publication venue
Cloud Computing Security

External Links

Snippet

Cloud services vary from data storage and processing to software provision, posing requirements for high availability and on-demand commitment-free provision of services. Cloud providers must provide information through their privacy policy and/or upon request of …
Continue reading at www.taylorfrancis.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor

Similar Documents

Publication Publication Date Title
US11347843B2 (en) Asset-based security systems and methods
Borky et al. Protecting information with cybersecurity
Kalloniatis et al. Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts
Yusop et al. Analysis of insiders attack mitigation strategies
Jouini et al. Surveying and analyzing security problems in cloud computing environments
Alhenaki et al. Security in cloud computing: a survey
Lata et al. A framework for security of public cloud environment
Kajiyama Cloud computing security: how risks and threats are affecting cloud adoption decisions
Stutz et al. Cyber threat detection and mitigation using artificial intelligence–A cyber‐physical perspective
Gupta et al. Blockchain-enhanced framework for secure third-party vendor risk management and vigilant security controls
Dhiman et al. Artificial intelligence and machine learning-enabled cybersecurity tools and techniques
Malomo et al. A survey on recent advances in cloud computing security
Tan et al. Post-quantum adversarial modeling: A user’s perspective
Ahmad et al. Cloud Computing–Threats and Challenges
Pitropakis et al. It's All in the Cloud: Reviewing Cloud Security
Reddy Zero-Day Threat Protection: Advanced Cybersecurity Measures for Cloud-Based Guidewire Implementations
Egerton et al. Applying zero trust security principles to defence mechanisms against data exfiltration attacks
Meriah et al. A survey of quantitative security risk analysis models for computer systems
Kujo Implementing zero trust architecture for identities and endpoints with Microsoft tools
Sultana et al. Survey on centric data protection method for cloud storage application
Pitropakis et al. Cloud security, privacy and trust baselines
Rawal et al. The basics of hacking and penetration testing
Powers et al. Whitelist malware defense for embedded control system devices
Pescatore SANS 2021 top new attacks and threat report
Jawad et al. Intelligent Cybersecurity Threat Management in Modern Information Technologies Systems