Villareal, 2021 - Google Patents
Factors influencing the adoption of zero-trust decentralized identity management solutionsVillareal, 2021
- Document ID
- 16576050615390070010
- Author
- Villareal C
- Publication year
External Links
Snippet
Zero-trust decentralized identity management solutions (DIMS) are emerging identity management systems that abandon the central authority figure and embrace the self- sovereign model of identity management. The goal of this design is to use the unified theory …
- 238000011160 research 0 abstract description 110
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30587—Details of specialised database models
- G06F17/30595—Relational databases
- G06F17/30598—Clustering or classification
- G06F17/30601—Clustering or classification including cluster or class visualization or browsing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/3071—Clustering or classification including class or cluster creation or modification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2117—User registration
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2145—Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11790117B2 (en) | Systems and methods for enforcing privacy-respectful, trusted communications | |
| Ansari et al. | A fuzzy TOPSIS based analysis toward selection of effective security requirements engineering approach for trustworthy healthcare software development | |
| CA3061638C (en) | Systems and methods for enforcing centralized privacy controls in de-centralized systems | |
| US10572684B2 (en) | Systems and methods for enforcing centralized privacy controls in de-centralized systems | |
| Williams | Social networking applications in health care: threats to the privacy and security of health information | |
| CA3104119A1 (en) | Systems and methods for enforcing privacy-respectful, trusted communications | |
| Santamaría-Philco et al. | Trust in e-participation: an empirical research on the influencing factors | |
| Matulevičius et al. | Ontological representation of healthcare application security using blockchain technology | |
| Villareal | Factors influencing the adoption of zero-trust decentralized identity management solutions | |
| Forrester | User information security behavior in professional virtual communities: A technology threat avoidance approach | |
| Kosa | Towards measuring privacy | |
| Alamri | Cybersecurity risk management and evaluation framework for blockchain identity management systems in health internet of things | |
| Cooper et al. | managing information security and privacy in healthcare data mining: State of the art | |
| Bartlett | Privacy and security management practices of emerging technologies: Internet of Things | |
| Maahs | Managerial strategies small businesses use to prevent cybercrime | |
| Rajendran et al. | Health informatics system using machine learning techniques | |
| Luna | A Framework for Evaluation of Risk Management Models for HIPAA Compliance for Electronic Personal Health Information used by Small and Medium Businesses using Cloud Technologies | |
| Mulaji | Technological, organisational, and environmental factors affecting the adoption of blockchain-based distributed identity management in organisations | |
| Beugré | Perceived behaviors and security compliance intention of employees processing big data: A correlational study | |
| Luesebrink | Institutionalization of Information Security Governance Structures in Academic Institutions: A Case Study | |
| KR102181009B1 (en) | Method for providing blockchain basesd financial activity management service for supervising negotiorum gestio in contractual guardianship | |
| Aldairi | Understanding the Challenges and Needs of Practitioners in Developing Privacy-Preserving Machine Learning Systems | |
| Schmickel | Exploring Security Approaches of Blockchain’s Privacy Preservation for Electronic Health Records | |
| Paul | Cognitive Factors Affecting Intention to Use Blockchain for Cyber Supply Chain Security | |
| Alharbi | Effects of the Protection Motivation Model on Information Security Policy Compliance Among Saudi Employees |