An - Google Patents
Security AND Privacy White PaperAn
- Document ID
- 6318240522501684205
- Author
- An I
External Links
- 238000005516 engineering process 0 abstract description 9
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Humphrey et al. | Security for grids | |
| Boritz et al. | Security in XML-based financial reporting services on the Internet | |
| Nordbotten | XML and web services security standards | |
| JP5021215B2 (en) | Reliable third-party authentication for web services | |
| US7487539B2 (en) | Cross domain authentication and security services using proxies for HTTP access | |
| US7953979B2 (en) | Systems and methods for enabling trust in a federated collaboration | |
| US20080263644A1 (en) | Federated authorization for distributed computing | |
| JP2005517348A (en) | A secure electronic messaging system that requires a key search to derive a decryption key | |
| Selkirk | Using XML security mechanisms | |
| Muthukrishnan et al. | Technical analysis on security realization in web services for e-business management | |
| An | Security AND Privacy White Paper | |
| Namlı et al. | Implementation experiences on ihe xua and bppc | |
| Vo | Identity as a Service: An adaptive security infrastructure and privacy-preserving user identity for the cloud environment | |
| Meduri | Webservice security | |
| Stefas | Decentralized authorization for web services | |
| Nordbotten | XML and Web Services Security | |
| INCIDENTAL et al. | Security in a Web Services World: A Proposed Architecture and Roadmap | |
| Dridi et al. | Managing Security in the World Wide Web: Architecture, Services and Techniques | |
| Cater | SOA: Service-Oriented Architecture | |
| Sultan et al. | Overcoming Barriers to Client-Side Digital Certificate Adoption | |
| Pimenidis et al. | Web services security evaluation considerations | |
| Chakrabarti | Grid Information Security Architecture | |
| Padmanabhuni et al. | Security in Service-Oriented Architecture: Issues, Standards and Implementations | |
| Chapman et al. | OMII Grid Security Technology Overview | |
| Cater | Service-Oriented Architecture and Web Services Security |