Vrana, 2025 - Google Patents
Cyber security and data ownershipVrana, 2025
View PDF- Document ID
- 5519897708730020230
- Author
- Vrana J
- Publication year
- Publication venue
- Handbook of nondestructive evaluation 4.0
External Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Dhinakaran et al. | Towards a novel privacy-preserving distributed multiparty data outsourcing scheme for cloud computing with quantum key distribution | |
| Lee | Security basics for computer architects | |
| Vrana | Cyber security and data ownership | |
| Kalaiprasath et al. | Cloud information accountability (cia) framework ensuring accountability of data in cloud and security in end to end process in cloud terminology | |
| Chidambaram et al. | Enhancing the security of customer data in cloud environments using a novel digital fingerprinting technique | |
| Banoth et al. | An introduction to classical and modern cryptography | |
| Bakro et al. | Hybrid blockchain-enabled security in cloud storage infrastructure using ECC and AES algorithms | |
| Luqman et al. | Privacy and security implications of cloud-based AI services: A survey | |
| Vidhya et al. | Blockchain‐Enabled Decentralized Healthcare Data Exchange: Leveraging Novel Encryption Scheme, Smart Contracts, and Ring Signatures for Enhanced Data Security and Patient Privacy | |
| Adeyinka et al. | Cybersecurity measures for protecting data | |
| Ullah et al. | Blockchain‐IoT: A revolutionary model for secure data storage and fine‐grained access control in internet of things | |
| Bingu et al. | A comprehensive review on security and privacy preservation in cloud environment | |
| Devmane et al. | Preserving data security in cloud environment using an adaptive homomorphic blockchain technique | |
| Singamaneni et al. | [Retracted] An Enhanced Dynamic Nonlinear Polynomial Integrity‐Based QHCP‐ABE Framework for Big Data Privacy and Security | |
| Li et al. | Improved public auditing system of cloud storage based on BLS signature | |
| Wang et al. | Security Enhancements for Data‐Driven Systems: A Blockchain‐Based Trustworthy Data Sharing Scheme | |
| Ravi | Quantum computing and cybersecurity: Systematic review of algorithms, challenges, and emerging solutions | |
| Kremer et al. | Cybersecurity | |
| Neethu et al. | Securing Data Privacy and Integrity in Cloud Computing Using Blockchain and Quantum Cryptography | |
| Arvin S. Lat et al. | SOUL System: secure online USB login system | |
| Mounnan et al. | Efficient distributed access control using blockchain for big data in clouds | |
| Gagged et al. | Improved secure dynamic bit standard technique for a private cloud platform to address security challenges | |
| Taruna et al. | Analysis of security issues in blockchain wallet | |
| UK | What is cybersecurity | |
| Jain et al. | A Survey on Cryptographic Algorithms and Information Security Practices |