Kelbert et al., 2013 - Google Patents
Data usage control enforcement in distributed systemsKelbert et al., 2013
View PDF- Document ID
- 7173998484190402573
- Author
- Kelbert F
- Pretschner A
- Publication year
- Publication venue
- Proceedings of the third ACM conference on Data and application security and privacy
External Links
Snippet
Distributed usage control is concerned with how data may or may not be used in distributed system environments after initial access has been granted. If data flows through a distributed system, there exist multiple copies of the data on different client machines. Usage …
- 230000005540 biological transmission 0 abstract description 13
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogramme communication; Intertask communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Application independent communication protocol aspects or techniques in packet data networks
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks
- H04L69/322—Aspects of intra-layer communication protocols among peer entities or protocol data unit [PDU] definitions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic regulation in packet switching networks
- H04L47/10—Flow control or congestion control
- H04L47/19—Flow control or congestion control at layers above network layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/26—Monitoring arrangements; Testing arrangements
- H04L12/2602—Monitoring arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Kelbert et al. | Data usage control enforcement in distributed systems | |
| Ali et al. | Multi-access edge computing architecture, data security and privacy: A review | |
| Yan et al. | A security and trust framework for virtualized networks and software‐defined networking | |
| US9305163B2 (en) | User, device, and app authentication implemented between a client device and VPN gateway | |
| US8997208B2 (en) | Gateway device for terminating a large volume of VPN connections | |
| US20230273853A1 (en) | Securing an application based on auto-learning and auto-mapping of application services and apis | |
| EP2951947B1 (en) | Method and system for automatically managing secure communications in multiple communications jurisdiction zones | |
| EP3175381B1 (en) | Method and system for providing a virtual asset perimeter | |
| US20240422054A1 (en) | Programmable switching device for network infrastructures | |
| US20250080503A1 (en) | Zero trust network access connector for customer premises | |
| Pizzato et al. | An intent-based solution for network isolation in Kubernetes | |
| KR20190049579A (en) | Method and apparatus for providing network security service | |
| US20240012921A1 (en) | Dynamic resolution and enforcement of data compliance | |
| WO2012163587A1 (en) | Distributed access control across the network firewalls | |
| AU2016203662A1 (en) | Microkernel gateway server | |
| Dongiovanni | Zero Trust Network Security Model in Containerized Environments | |
| Pattaranantakul | Moving towards software-defined security in the era of NFV and SDN | |
| Akyol et al. | Transaction-based building controls framework, Volume 2: Platform descriptive model and requirements | |
| Leiwo et al. | A security design for a wide-area distributed system | |
| Kumar et al. | Real-time application layer protocols to support lightweight mechanism in internet of things for e-healthcare systems | |
| Patel | Securing GCP Infrastructure: Beyond the Basics | |
| Faraji | Identity and access management in multi-tier cloud infrastructure | |
| Giacometti | Authorizing access to edge resources using 5G device authentication | |
| CN120856442A (en) | An authentication method and related device based on RPC communication | |
| CN119030768A (en) | A private cloud network construction method, device, electronic equipment and storage medium |