Download presentation
Presentation is loading. Please wait.
Published byAmberlynn York Modified over 9 years ago
1
Privacy Communication Privacy Confidentiality Access Policies Systems Crypto Enforced Computing on Encrypted Data Searching and Reporting Fully Homomorphic Encryption Secure Data Aggregation Key Management Provenance End-point Input Validation Communication Integrity Authenticated Computations on Data Trusted Platforms Crypto Enforced Granular Audits Control of Valuable Assets Lifecycle Management Retention, Disposition, Hold Digital Rights Management System Health Security against DoS Construction of cryptographic protocols proactively resistant to DoS Big Data for Security Analytics for Security Intelligence Data-driven Abuse Detection Large-scale and Streaming Data Analysis Event Detection Forensics Technical
2
Architectural Sources Transformation Uses Data Infrastructure Securing Data Storage and Transaction logs Key Management Security Best Practices for non-relational data stores Security against DoS attacks Data Provenance
3
Follow the Data Resolve ownership of data at source – Optional integrity Digital signatures – Roles The attributes that an entity should have to access data – Content Derive an access control policy – Could be part of a contract – Encrypted Data Optional Capabilities: Search, Computation Crypto-enforced policy-based access control – Plaintext Data Data available to the collecting entity Understanding of dissemination guarantees
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.