+

Vrana, 2025 - Google Patents

Cyber security and data ownership

Vrana, 2025

View PDF
Document ID
5519897708730020230
Author
Vrana J
Publication year
Publication venue
Handbook of nondestructive evaluation 4.0

External Links

Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies

Similar Documents

Publication Publication Date Title
Dhinakaran et al. Towards a novel privacy-preserving distributed multiparty data outsourcing scheme for cloud computing with quantum key distribution
Lee Security basics for computer architects
Vrana Cyber security and data ownership
Kalaiprasath et al. Cloud information accountability (cia) framework ensuring accountability of data in cloud and security in end to end process in cloud terminology
Chidambaram et al. Enhancing the security of customer data in cloud environments using a novel digital fingerprinting technique
Banoth et al. An introduction to classical and modern cryptography
Bakro et al. Hybrid blockchain-enabled security in cloud storage infrastructure using ECC and AES algorithms
Luqman et al. Privacy and security implications of cloud-based AI services: A survey
Vidhya et al. Blockchain‐Enabled Decentralized Healthcare Data Exchange: Leveraging Novel Encryption Scheme, Smart Contracts, and Ring Signatures for Enhanced Data Security and Patient Privacy
Adeyinka et al. Cybersecurity measures for protecting data
Ullah et al. Blockchain‐IoT: A revolutionary model for secure data storage and fine‐grained access control in internet of things
Bingu et al. A comprehensive review on security and privacy preservation in cloud environment
Devmane et al. Preserving data security in cloud environment using an adaptive homomorphic blockchain technique
Singamaneni et al. [Retracted] An Enhanced Dynamic Nonlinear Polynomial Integrity‐Based QHCP‐ABE Framework for Big Data Privacy and Security
Li et al. Improved public auditing system of cloud storage based on BLS signature
Wang et al. Security Enhancements for Data‐Driven Systems: A Blockchain‐Based Trustworthy Data Sharing Scheme
Ravi Quantum computing and cybersecurity: Systematic review of algorithms, challenges, and emerging solutions
Kremer et al. Cybersecurity
Neethu et al. Securing Data Privacy and Integrity in Cloud Computing Using Blockchain and Quantum Cryptography
Arvin S. Lat et al. SOUL System: secure online USB login system
Mounnan et al. Efficient distributed access control using blockchain for big data in clouds
Gagged et al. Improved secure dynamic bit standard technique for a private cloud platform to address security challenges
Taruna et al. Analysis of security issues in blockchain wallet
UK What is cybersecurity
Jain et al. A Survey on Cryptographic Algorithms and Information Security Practices
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载