[go: up one dir, main page]

Jensen et al., 2003 - Google Patents

Policy expression and enforcement for handheld devices

Jensen et al., 2003

View PDF
Document ID
9324498796439699445
Author
Jensen W
Karygiannis T
Korolev V
Gavrila S
Iorga M
et al.
Publication year
Publication venue
NISTIR 6981

External Links

Snippet

The use of mobile handheld devices, such as Personal Digital Assistants (PDAs) and tablet computers, within the workplace is expanding rapidly. These devices are no longer viewed as coveted gadgets for early technology adopters, but instead have become indispensable …
Continue reading at ebiquity.umbc.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems

Similar Documents

Publication Publication Date Title
US8341707B2 (en) Near real-time multi-party task authorization access control
Fernandez-Buglioni Security patterns in practice: designing secure architectures using software patterns
JP6426189B2 (en) System and method for biometric protocol standard
US7509497B2 (en) System and method for providing security to an application
CN100533451C (en) System and method for an enhanced layer of security to protect a file system from malicious programs
MXPA04007143A (en) Delegated administration of a hosted resource.
KR20040060952A (en) Portability and privacy with data communications network browsing
CN102598577A (en) Authentication using cloud authentication
US20140208409A1 (en) Access to data stored in a cloud
US11146403B2 (en) Self-governed secure attestation policy for server data privacy logs
South et al. Authenticated delegation and authorized ai agents
Vitabile et al. An extended JADE-S based framework for developing secure Multi-Agent Systems
WO2023241879A1 (en) Protecting sensitive data dump information
CN116415217A (en) Instant authorization system based on zero trust architecture
Jensen et al. Security policy management for handheld devices
CN118713867A (en) Method, device, electronic device and storage medium for mutual recognition of identities between systems
Delessy et al. Patterns for access control in distributed systems
Jensen et al. Policy expression and enforcement for handheld devices
Anderson Java™ access control mechanisms
WO2022000156A1 (en) Selective security augmentation in source control environments
Wild et al. Proprotect3: An approach for protecting user profile data from disclosure, tampering, and improper use in the context of webid
Trias et al. Enterprise level security
Musoke et al. Identity inclusion: A digital national identification for all
Toth et al. The persona concept: a consumer-centered identity model
Tuononen Privileged access management model for a managed service provider