Jensen et al., 2003 - Google Patents
Policy expression and enforcement for handheld devicesJensen et al., 2003
View PDF- Document ID
- 9324498796439699445
- Author
- Jensen W
- Karygiannis T
- Korolev V
- Gavrila S
- Iorga M
- et al.
- Publication year
- Publication venue
- NISTIR 6981
External Links
Snippet
The use of mobile handheld devices, such as Personal Digital Assistants (PDAs) and tablet computers, within the workplace is expanding rapidly. These devices are no longer viewed as coveted gadgets for early technology adopters, but instead have become indispensable …
- 238000005516 engineering process 0 abstract description 10
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8341707B2 (en) | Near real-time multi-party task authorization access control | |
Fernandez-Buglioni | Security patterns in practice: designing secure architectures using software patterns | |
JP6426189B2 (en) | System and method for biometric protocol standard | |
US7509497B2 (en) | System and method for providing security to an application | |
CN100533451C (en) | System and method for an enhanced layer of security to protect a file system from malicious programs | |
MXPA04007143A (en) | Delegated administration of a hosted resource. | |
KR20040060952A (en) | Portability and privacy with data communications network browsing | |
CN102598577A (en) | Authentication using cloud authentication | |
US20140208409A1 (en) | Access to data stored in a cloud | |
US11146403B2 (en) | Self-governed secure attestation policy for server data privacy logs | |
South et al. | Authenticated delegation and authorized ai agents | |
Vitabile et al. | An extended JADE-S based framework for developing secure Multi-Agent Systems | |
WO2023241879A1 (en) | Protecting sensitive data dump information | |
CN116415217A (en) | Instant authorization system based on zero trust architecture | |
Jensen et al. | Security policy management for handheld devices | |
CN118713867A (en) | Method, device, electronic device and storage medium for mutual recognition of identities between systems | |
Delessy et al. | Patterns for access control in distributed systems | |
Jensen et al. | Policy expression and enforcement for handheld devices | |
Anderson | Java™ access control mechanisms | |
WO2022000156A1 (en) | Selective security augmentation in source control environments | |
Wild et al. | Proprotect3: An approach for protecting user profile data from disclosure, tampering, and improper use in the context of webid | |
Trias et al. | Enterprise level security | |
Musoke et al. | Identity inclusion: A digital national identification for all | |
Toth et al. | The persona concept: a consumer-centered identity model | |
Tuononen | Privileged access management model for a managed service provider |