Pitropakis et al., 2020 - Google Patents
Cloud security, privacy and trust baselinesPitropakis et al., 2020
- Document ID
- 4812557273775957933
- Author
- Pitropakis N
- Katsikas S
- Lambrinoudakis C
- Publication year
- Publication venue
- Cloud Computing Security
External Links
Snippet
Cloud services vary from data storage and processing to software provision, posing requirements for high availability and on-demand commitment-free provision of services. Cloud providers must provide information through their privacy policy and/or upon request of …
- 230000002950 deficient 0 abstract description 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11347843B2 (en) | Asset-based security systems and methods | |
| Borky et al. | Protecting information with cybersecurity | |
| Kalloniatis et al. | Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts | |
| Yusop et al. | Analysis of insiders attack mitigation strategies | |
| Jouini et al. | Surveying and analyzing security problems in cloud computing environments | |
| Alhenaki et al. | Security in cloud computing: a survey | |
| Lata et al. | A framework for security of public cloud environment | |
| Kajiyama | Cloud computing security: how risks and threats are affecting cloud adoption decisions | |
| Stutz et al. | Cyber threat detection and mitigation using artificial intelligence–A cyber‐physical perspective | |
| Gupta et al. | Blockchain-enhanced framework for secure third-party vendor risk management and vigilant security controls | |
| Dhiman et al. | Artificial intelligence and machine learning-enabled cybersecurity tools and techniques | |
| Malomo et al. | A survey on recent advances in cloud computing security | |
| Tan et al. | Post-quantum adversarial modeling: A user’s perspective | |
| Ahmad et al. | Cloud Computing–Threats and Challenges | |
| Pitropakis et al. | It's All in the Cloud: Reviewing Cloud Security | |
| Reddy | Zero-Day Threat Protection: Advanced Cybersecurity Measures for Cloud-Based Guidewire Implementations | |
| Egerton et al. | Applying zero trust security principles to defence mechanisms against data exfiltration attacks | |
| Meriah et al. | A survey of quantitative security risk analysis models for computer systems | |
| Kujo | Implementing zero trust architecture for identities and endpoints with Microsoft tools | |
| Sultana et al. | Survey on centric data protection method for cloud storage application | |
| Pitropakis et al. | Cloud security, privacy and trust baselines | |
| Rawal et al. | The basics of hacking and penetration testing | |
| Powers et al. | Whitelist malware defense for embedded control system devices | |
| Pescatore | SANS 2021 top new attacks and threat report | |
| Jawad et al. | Intelligent Cybersecurity Threat Management in Modern Information Technologies Systems |