+

Song et al., 2003 - Google Patents

isecurity: A security framework for interactive workspaces

Song et al., 2003

View PDF
Document ID
3248454779808005874
Author
Song Y
Tobagus W
Leong D
Johanson B
Fox A
Publication year
Publication venue
Palo Alto, CA, USA, Tech. Rep

External Links

Snippet

Security is an important and open issue in ubiquitous computing. Recent work has focused either on developing models of security suitable for various ubiquitous computing environments, or on the coupling of context-awareness with traditional security mechanisms …
Continue reading at hci.stanford.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogramme communication; Intertask communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F1/00Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
    • G06F1/16Constructional details or arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
Novo Blockchain meets IoT: An architecture for scalable access management in IoT
Joshi et al. Security models for web-based applications
Zissis et al. Addressing cloud computing security issues
US7665118B2 (en) Server, computer memory, and method to support security policy maintenance and distribution
Mahalle et al. Identity management framework towards internet of things (IoT): Roadmap and key challenges
Al-Muhtadi et al. A lightweight cyber security framework with context-awareness for pervasive computing environments
US20060190984A1 (en) Gatekeeper architecture/features to support security policy maintenance and distribution
US20070061870A1 (en) Method and system to provide secure data connection between creation points and use points
JP2006500657A (en) Server, computer memory, and method for supporting security policy maintenance and distribution
CN103020542B (en) Store the technology of the secret information being used for global data center
Talib et al. Towards new data access control technique based on multi agent system architecture for cloud computing
Pizzato et al. An intent-based solution for network isolation in Kubernetes
Song et al. isecurity: A security framework for interactive workspaces
Al-Jaroodi et al. Security middleware approaches and issues for ubiquitous applications
Olsson et al. 5G zero trust–a zero-trust architecture for telecom
Ahmed et al. A generalized threat taxonomy for cloud computing
Muhseen et al. A review in security issues and challenges on mobile cloud computing (MCC)
Weippl et al. Personal trusted devices for web services: revisiting multilevel security
Barraca et al. User centric community clouds
Li et al. A deep understanding of cloud computing security
Al-Jaroodi et al. A survey of security middleware for pervasive and ubiquitous systems
Rosado et al. Obtaining security requirements for a mobile grid system
Park et al. Active access control (AAC) with fine‐granularity and scalability
Jean et al. SAS: A secure aglet server
Che et al. BABAC: An access control framework for network virtualization using user behaviors and attributes
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载