Ranchal - Google Patents

CERIAS Tech Report 2015-19 Cross-Domain Data Dissemination And Policy Enforcement

Ranchal

View PDF
Document ID
2323217634927954380
Author
Ranchal R

External Links

Snippet

Advances in Information and Communications Technology (ICT) have created a dig ital economy based on the exchange of information. Information sharing is critical to enhance productivity and maintain competitiveness in the digital economy. Big data is created …
Continue reading at www.cerias.purdue.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies

Similar Documents

Publication Publication Date Title
Chakrabarti Grid computing security
Ranchal et al. Protection of identity information in cloud computing without trusted third party
David et al. Cloud Security Service for Identifying Unauthorized User Behaviour.
Nuñez et al. BlindIdM: A privacy-preserving approach for identity management as a service
Ranchal et al. Epics: A framework for enforcing security policies in composite web services
Kiraz A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing
Goswami et al. Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability
Alansari A blockchain-based approach for secure, transparent and accountable personal data sharing
Lou et al. Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system
Bingu et al. A comprehensive review on security and privacy preservation in cloud environment
Bichsel et al. An architecture for privacy-ABCs
US9219715B2 (en) Mediator utilizing electronic content to enforce policies to a resource
Srikanth et al. Security issues in cloud and mobile cloud: A comprehensive survey
Pervez et al. Oblivious access control policies for cloud based data sharing systems
Purushothama et al. Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud
Shmeleva How Microservices are Changing the Security Landscape
Beuchelt Securing Web applications, services, and servers
Ferretti et al. Verifiable delegated authorization for user-centric architectures and an OAuth2 implementation
Li Context-aware attribute-based techniques for data security and access control in mobile cloud environment
Ulybyshev Data Protection in Transit and at Rest with Leakage Detection
Shepherd Zero Trust Architecture: Framework and Case Study
Suomalainen Defense-in-Depth Methods in Microservices Access Control
Ranchal CERIAS Tech Report 2015-19 Cross-Domain Data Dissemination And Policy Enforcement
Yeluri et al. Identity management and control for clouds
Chaurasia et al. BACP-IeFC: designing blockchain-based access control protocol in IoT-enabled fog computing environment