[go: up one dir, main page]

Lee et al., 2019 - Google Patents

Secure and efficient protection for HTTP cookies with self‐verification

Lee et al., 2019

Document ID
6949144025079716843
Author
Lee W
Chen H
Chang S
Chen T
Publication year
Publication venue
International Journal of Communication Systems

External Links

Snippet

Hypertext transfer protocol (HTTP) cookies are used to store user‐related information sent by a website, and they can be read again later to maintain a link between a user's computer and the website and to remember the user's previous state on the website. In cloud services …
Continue reading at onlinelibrary.wiley.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers

Similar Documents

Publication Publication Date Title
Davidson et al. Privacy pass: Bypassing internet challenges anonymously
Kaur et al. A secure two‐factor authentication framework in cloud computing
Ma et al. Security flaws in two improved remote user authentication schemes using smart cards
Ranchal et al. Protection of identity information in cloud computing without trusted third party
US8185942B2 (en) Client-server opaque token passing apparatus and method
Darwish et al. Decentralizing privacy implementation at cloud storage using blockchain-based hybrid algorithm
Sumitra et al. A survey of cloud authentication attacks and solution approaches
Choi et al. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics
US10250589B2 (en) System and method for protecting access to authentication systems
Lee et al. Secure and efficient protection for HTTP cookies with self‐verification
Liu et al. A secure cookie protocol
Hussein et al. A survey of cryptography cloud storage techniques
Khan et al. SSM: Secure-Split-Merge data distribution in cloud infrastructure
Prapty et al. Preventing session hijacking using encrypted one-time-cookies
US11163893B2 (en) Methods and systems for a redundantly secure data store using independent networks
CN115118455B (en) Attribute-based encryption access control anti-crawler system and method for webpage security
Badra et al. Phishing attacks and solutions
Olanrewaju et al. Enhancing cloud data security using hybrid of advanced encryption standard and blowfish encryption algorithms
Zhao et al. A security analysis of two commercial browser and cloud based password managers
Sood et al. Inverse Cookie-based Virtual Password Authentication Protocol.
Rastogi et al. Secured identity management system for preserving data privacy and transmission in cloud computing
Tikore et al. Ensuring the data integrity and confidentiality in cloud storage using hash function and TPA
Hammami et al. Security issues in cloud computing and associated alleviation approaches
Kumar et al. Realization of threats and countermeasure in Semantic Web services
Arvin S. Lat et al. SOUL System: secure online USB login system