+

Marillonnet, 2021 - Google Patents

User centric personal data management

Marillonnet, 2021

View PDF
Document ID
7833676064573431346
Author
Marillonnet P
Publication year

External Links

Snippet

This Ph. D. addresses the user-centric management of Personally Identifiable Information (PII) within local collectivities. It has been realized as part of a CIFRE program between SAMOVAR and Entr'ouvert. There is a strong need to provide the users of the collectivities' …
Continue reading at theses.hal.science (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • G06F21/608Secure printing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2115Third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards

Similar Documents

Publication Publication Date Title
US7823189B2 (en) System and method for dynamic role association
CN112272835A (en) Secure licensing of user account access, including secure distribution of aggregated user account data
US20060074703A1 (en) Providing and managing business processes
AU2002310144A1 (en) System and method for server security and entitlement processing
KR102450412B1 (en) Service level agreement-based sharing economy service provision system and method in the Internet of Things
Paolini et al. Authentication, authorization, and accounting
Cameron et al. Introduction to IAM Architecture (v2)
Mishra et al. Blockchain DrivenAccess control architecture for the internet of things
Suzic Securing integration of cloud services in cross-domain distributed environments
KR20070072922A (en) Network Linked Service Licensing System and Method
Watt et al. Federated authentication and authorisation in the social science domain
Marillonnet et al. An Efficient User‐Centric Consent Management Design for Multiservices Platforms
Rafe et al. A security framework for developing service‐oriented software architectures
Kudra et al. Digital Identity Wallets: A Guide to the EU’s New Identity Model
Marillonnet User centric personal data management
Dobbs IAM Reference Architecture (v2)
Feulner et al. Self-Sovereign Identity for Digital KYC
Čučko et al. A Novel Model for Authority and Access Delegation Utilizing Self-Sovereign Identity and Verifiable Credentials
Buecker et al. Federated Identity Management and Web Services Security
Zenden The identity mangement solution that improves data sharing in logistics
Peixoto Usage policy control data app for data spaces
Cheng Blockchain-Based Identification and Access Control Framework-A Case Study of Open Banking Ecosystem
Pranata et al. Digital ecosystem access control management
Damon A framework for identity and access assurance
Buecker et al. IT Security Policy Management Usage Patterns Using IBM Tivoli Security Policy Manager
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载