[go: up one dir, main page]

Kelbert et al., 2013 - Google Patents

Data usage control enforcement in distributed systems

Kelbert et al., 2013

View PDF
Document ID
7173998484190402573
Author
Kelbert F
Pretschner A
Publication year
Publication venue
Proceedings of the third ACM conference on Data and application security and privacy

External Links

Snippet

Distributed usage control is concerned with how data may or may not be used in distributed system environments after initial access has been granted. If data flows through a distributed system, there exist multiple copies of the data on different client machines. Usage …
Continue reading at dl.acm.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogramme communication; Intertask communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Application independent communication protocol aspects or techniques in packet data networks
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks
    • H04L69/322Aspects of intra-layer communication protocols among peer entities or protocol data unit [PDU] definitions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic regulation in packet switching networks
    • H04L47/10Flow control or congestion control
    • H04L47/19Flow control or congestion control at layers above network layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/26Monitoring arrangements; Testing arrangements
    • H04L12/2602Monitoring arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data

Similar Documents

Publication Publication Date Title
Kelbert et al. Data usage control enforcement in distributed systems
Ali et al. Multi-access edge computing architecture, data security and privacy: A review
Yan et al. A security and trust framework for virtualized networks and software‐defined networking
US9305163B2 (en) User, device, and app authentication implemented between a client device and VPN gateway
US8997208B2 (en) Gateway device for terminating a large volume of VPN connections
US20230273853A1 (en) Securing an application based on auto-learning and auto-mapping of application services and apis
EP2951947B1 (en) Method and system for automatically managing secure communications in multiple communications jurisdiction zones
EP3175381B1 (en) Method and system for providing a virtual asset perimeter
US20240422054A1 (en) Programmable switching device for network infrastructures
US20250080503A1 (en) Zero trust network access connector for customer premises
Pizzato et al. An intent-based solution for network isolation in Kubernetes
KR20190049579A (en) Method and apparatus for providing network security service
US20240012921A1 (en) Dynamic resolution and enforcement of data compliance
WO2012163587A1 (en) Distributed access control across the network firewalls
AU2016203662A1 (en) Microkernel gateway server
Dongiovanni Zero Trust Network Security Model in Containerized Environments
Pattaranantakul Moving towards software-defined security in the era of NFV and SDN
Akyol et al. Transaction-based building controls framework, Volume 2: Platform descriptive model and requirements
Leiwo et al. A security design for a wide-area distributed system
Kumar et al. Real-time application layer protocols to support lightweight mechanism in internet of things for e-healthcare systems
Patel Securing GCP Infrastructure: Beyond the Basics
Faraji Identity and access management in multi-tier cloud infrastructure
Giacometti Authorizing access to edge resources using 5G device authentication
CN120856442A (en) An authentication method and related device based on RPC communication
CN119030768A (en) A private cloud network construction method, device, electronic equipment and storage medium