Song et al., 2003 - Google Patents
isecurity: A security framework for interactive workspacesSong et al., 2003
View PDF- Document ID
- 3248454779808005874
- Author
- Song Y
- Tobagus W
- Leong D
- Johanson B
- Fox A
- Publication year
- Publication venue
- Palo Alto, CA, USA, Tech. Rep
External Links
Snippet
Security is an important and open issue in ubiquitous computing. Recent work has focused either on developing models of security suitable for various ubiquitous computing environments, or on the coupling of context-awareness with traditional security mechanisms …
- 230000002452 interceptive 0 title abstract description 55
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogramme communication; Intertask communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
- G06F1/16—Constructional details or arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Novo | Blockchain meets IoT: An architecture for scalable access management in IoT | |
| Joshi et al. | Security models for web-based applications | |
| Zissis et al. | Addressing cloud computing security issues | |
| US7665118B2 (en) | Server, computer memory, and method to support security policy maintenance and distribution | |
| Mahalle et al. | Identity management framework towards internet of things (IoT): Roadmap and key challenges | |
| Al-Muhtadi et al. | A lightweight cyber security framework with context-awareness for pervasive computing environments | |
| US20060190984A1 (en) | Gatekeeper architecture/features to support security policy maintenance and distribution | |
| US20070061870A1 (en) | Method and system to provide secure data connection between creation points and use points | |
| JP2006500657A (en) | Server, computer memory, and method for supporting security policy maintenance and distribution | |
| CN103020542B (en) | Store the technology of the secret information being used for global data center | |
| Talib et al. | Towards new data access control technique based on multi agent system architecture for cloud computing | |
| Pizzato et al. | An intent-based solution for network isolation in Kubernetes | |
| Song et al. | isecurity: A security framework for interactive workspaces | |
| Al-Jaroodi et al. | Security middleware approaches and issues for ubiquitous applications | |
| Olsson et al. | 5G zero trust–a zero-trust architecture for telecom | |
| Ahmed et al. | A generalized threat taxonomy for cloud computing | |
| Muhseen et al. | A review in security issues and challenges on mobile cloud computing (MCC) | |
| Weippl et al. | Personal trusted devices for web services: revisiting multilevel security | |
| Barraca et al. | User centric community clouds | |
| Li et al. | A deep understanding of cloud computing security | |
| Al-Jaroodi et al. | A survey of security middleware for pervasive and ubiquitous systems | |
| Rosado et al. | Obtaining security requirements for a mobile grid system | |
| Park et al. | Active access control (AAC) with fine‐granularity and scalability | |
| Jean et al. | SAS: A secure aglet server | |
| Che et al. | BABAC: An access control framework for network virtualization using user behaviors and attributes |