Williamson et al., 2015 - Google Patents
Secure Information SharingWilliamson et al., 2015
View PDF- Document ID
- 12717921028931764188
- Author
- Williamson G
- et al.
- Publication year
- Publication venue
- KuppingerCole Report from KuppingerCole Analysts
External Links
Snippet
There are multiple options for organisations with intellectual property and restricted information that must be shared between staff and business partners to adopt in order to avoid inadvertent release of restricted information to unauthorized personnel. This document …
- 239000000047 product 0 description 231
Similar Documents
Publication | Publication Date | Title |
---|---|---|
USRE48919E1 (en) | Systems and methods for cloud data security | |
US8875234B2 (en) | Operator provisioning of a trustworthy workspace to a subscriber | |
US10020936B1 (en) | Systems and methods for encryption and provision of information security using platform services | |
US9148419B2 (en) | User administering a trustworthy workspace | |
US8996884B2 (en) | High privacy of file synchronization with sharing functionality | |
US9209972B2 (en) | Mediator device monitoring and controlling access to electronic content | |
US20160063272A1 (en) | Secure virtual file management system | |
Ahmad et al. | Cloud security framework and key management services collectively for implementing DLP and IRM | |
Murray et al. | Cloud service security & application vulnerability | |
US10972443B2 (en) | System and method for encrypted document co-editing | |
US9219715B2 (en) | Mediator utilizing electronic content to enforce policies to a resource | |
Williamson | Secure Information Sharing | |
US9092780B2 (en) | User-mediator monitoring and controlling access to electronic content | |
Sterk et al. | Enterprise Mobility Management Smackdown | |
Teng et al. | Hierarchical role-based access control for multi-user collaborative cad environment | |
Lakshmi | Data Protection | |
Kostadinovska | Cloud security-An approach with modern cryptographic solutions | |
Goldman et al. | Encryption in the Hands of End Users | |
Sayler | Securing and Managing Trust in Modern Computing Applications |