[go: up one dir, main page]

Villareal, 2021 - Google Patents

Factors influencing the adoption of zero-trust decentralized identity management solutions

Villareal, 2021

Document ID
16576050615390070010
Author
Villareal C
Publication year

External Links

Snippet

Zero-trust decentralized identity management solutions (DIMS) are emerging identity management systems that abandon the central authority figure and embrace the self- sovereign model of identity management. The goal of this design is to use the unified theory …
Continue reading at search.proquest.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30587Details of specialised database models
    • G06F17/30595Relational databases
    • G06F17/30598Clustering or classification
    • G06F17/30601Clustering or classification including cluster or class visualization or browsing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30705Clustering or classification
    • G06F17/3071Clustering or classification including class or cluster creation or modification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2117User registration
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2145Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy

Similar Documents

Publication Publication Date Title
US11790117B2 (en) Systems and methods for enforcing privacy-respectful, trusted communications
Ansari et al. A fuzzy TOPSIS based analysis toward selection of effective security requirements engineering approach for trustworthy healthcare software development
CA3061638C (en) Systems and methods for enforcing centralized privacy controls in de-centralized systems
US10572684B2 (en) Systems and methods for enforcing centralized privacy controls in de-centralized systems
Williams Social networking applications in health care: threats to the privacy and security of health information
CA3104119A1 (en) Systems and methods for enforcing privacy-respectful, trusted communications
Santamaría-Philco et al. Trust in e-participation: an empirical research on the influencing factors
Matulevičius et al. Ontological representation of healthcare application security using blockchain technology
Villareal Factors influencing the adoption of zero-trust decentralized identity management solutions
Forrester User information security behavior in professional virtual communities: A technology threat avoidance approach
Kosa Towards measuring privacy
Alamri Cybersecurity risk management and evaluation framework for blockchain identity management systems in health internet of things
Cooper et al. managing information security and privacy in healthcare data mining: State of the art
Bartlett Privacy and security management practices of emerging technologies: Internet of Things
Maahs Managerial strategies small businesses use to prevent cybercrime
Rajendran et al. Health informatics system using machine learning techniques
Luna A Framework for Evaluation of Risk Management Models for HIPAA Compliance for Electronic Personal Health Information used by Small and Medium Businesses using Cloud Technologies
Mulaji Technological, organisational, and environmental factors affecting the adoption of blockchain-based distributed identity management in organisations
Beugré Perceived behaviors and security compliance intention of employees processing big data: A correlational study
Luesebrink Institutionalization of Information Security Governance Structures in Academic Institutions: A Case Study
KR102181009B1 (en) Method for providing blockchain basesd financial activity management service for supervising negotiorum gestio in contractual guardianship
Aldairi Understanding the Challenges and Needs of Practitioners in Developing Privacy-Preserving Machine Learning Systems
Schmickel Exploring Security Approaches of Blockchain’s Privacy Preservation for Electronic Health Records
Paul Cognitive Factors Affecting Intention to Use Blockchain for Cyber Supply Chain Security
Alharbi Effects of the Protection Motivation Model on Information Security Policy Compliance Among Saudi Employees