Ranchal - Google Patents
CERIAS Tech Report 2015-19 Cross-Domain Data Dissemination And Policy EnforcementRanchal
View PDF- Document ID
- 2323217634927954380
- Author
- Ranchal R
External Links
Snippet
Advances in Information and Communications Technology (ICT) have created a dig ital economy based on the exchange of information. Information sharing is critical to enhance productivity and maintain competitiveness in the digital economy. Big data is created …
- 230000002708 enhancing 0 abstract description 24
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chakrabarti | Grid computing security | |
Ranchal et al. | Protection of identity information in cloud computing without trusted third party | |
David et al. | Cloud Security Service for Identifying Unauthorized User Behaviour. | |
Nuñez et al. | BlindIdM: A privacy-preserving approach for identity management as a service | |
Ranchal et al. | Epics: A framework for enforcing security policies in composite web services | |
Kiraz | A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing | |
Goswami et al. | Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability | |
Alansari | A blockchain-based approach for secure, transparent and accountable personal data sharing | |
Lou et al. | Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system | |
Bingu et al. | A comprehensive review on security and privacy preservation in cloud environment | |
Bichsel et al. | An architecture for privacy-ABCs | |
US9219715B2 (en) | Mediator utilizing electronic content to enforce policies to a resource | |
Srikanth et al. | Security issues in cloud and mobile cloud: A comprehensive survey | |
Pervez et al. | Oblivious access control policies for cloud based data sharing systems | |
Purushothama et al. | Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud | |
Shmeleva | How Microservices are Changing the Security Landscape | |
Beuchelt | Securing Web applications, services, and servers | |
Ferretti et al. | Verifiable delegated authorization for user-centric architectures and an OAuth2 implementation | |
Li | Context-aware attribute-based techniques for data security and access control in mobile cloud environment | |
Ulybyshev | Data Protection in Transit and at Rest with Leakage Detection | |
Shepherd | Zero Trust Architecture: Framework and Case Study | |
Suomalainen | Defense-in-Depth Methods in Microservices Access Control | |
Ranchal | CERIAS Tech Report 2015-19 Cross-Domain Data Dissemination And Policy Enforcement | |
Yeluri et al. | Identity management and control for clouds | |
Chaurasia et al. | BACP-IeFC: designing blockchain-based access control protocol in IoT-enabled fog computing environment |