Lee et al., 2019 - Google Patents
Secure and efficient protection for HTTP cookies with self‐verificationLee et al., 2019
- Document ID
- 6949144025079716843
- Author
- Lee W
- Chen H
- Chang S
- Chen T
- Publication year
- Publication venue
- International Journal of Communication Systems
External Links
Snippet
Hypertext transfer protocol (HTTP) cookies are used to store user‐related information sent by a website, and they can be read again later to maintain a link between a user's computer and the website and to remember the user's previous state on the website. In cloud services …
- 235000014510 cooky 0 title abstract description 135
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Davidson et al. | Privacy pass: Bypassing internet challenges anonymously | |
| Kaur et al. | A secure two‐factor authentication framework in cloud computing | |
| Ma et al. | Security flaws in two improved remote user authentication schemes using smart cards | |
| Ranchal et al. | Protection of identity information in cloud computing without trusted third party | |
| US8185942B2 (en) | Client-server opaque token passing apparatus and method | |
| Darwish et al. | Decentralizing privacy implementation at cloud storage using blockchain-based hybrid algorithm | |
| Sumitra et al. | A survey of cloud authentication attacks and solution approaches | |
| Choi et al. | Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics | |
| US10250589B2 (en) | System and method for protecting access to authentication systems | |
| Lee et al. | Secure and efficient protection for HTTP cookies with self‐verification | |
| Liu et al. | A secure cookie protocol | |
| Hussein et al. | A survey of cryptography cloud storage techniques | |
| Khan et al. | SSM: Secure-Split-Merge data distribution in cloud infrastructure | |
| Prapty et al. | Preventing session hijacking using encrypted one-time-cookies | |
| US11163893B2 (en) | Methods and systems for a redundantly secure data store using independent networks | |
| CN115118455B (en) | Attribute-based encryption access control anti-crawler system and method for webpage security | |
| Badra et al. | Phishing attacks and solutions | |
| Olanrewaju et al. | Enhancing cloud data security using hybrid of advanced encryption standard and blowfish encryption algorithms | |
| Zhao et al. | A security analysis of two commercial browser and cloud based password managers | |
| Sood et al. | Inverse Cookie-based Virtual Password Authentication Protocol. | |
| Rastogi et al. | Secured identity management system for preserving data privacy and transmission in cloud computing | |
| Tikore et al. | Ensuring the data integrity and confidentiality in cloud storage using hash function and TPA | |
| Hammami et al. | Security issues in cloud computing and associated alleviation approaches | |
| Kumar et al. | Realization of threats and countermeasure in Semantic Web services | |
| Arvin S. Lat et al. | SOUL System: secure online USB login system |