Automated multi-level federation and enforcement of information management policies in a device network

作者: Karl Ginter , Michael Bartman , Yoav Weiss , David Goldschlag

DOI:

关键词: MetadataDiscount pointsComputer ApplicationsElement (criminal law)Information managementComputer memoryPolicy enforcementComputer securityEnforcementBusiness

摘要: Methods, apparatus, systems, and non-transitory computer-readable media for managing a plurality of disparate computer application data control policies on computing device, especially device connected to network, are described. In one example, at least policy distribution point is provided that includes including information management policy. A enforcement points, first operating level, second also provided. element the point, allocated. compartment in memory communication with said or more applications, data, metadata specified controlled by

参考文章(79)
Toby Bearden, David Harp, Jason Matthew Godfrey, Systems and methods to route network communications for network-based services ,(2010)
Mark Alexander McGloin, Olgierd Stanislaw Pieczul, Brent Allan Hepburn, David Scott Kern, Mary Ellen Zurko, Method and system for authenticating a rich client to a web or cloud application ,(2010)
Kimbry L. McClure, Clay D. Bomgardner, Method and system for cross-domain data security ,(2011)
Troy Jacob Ronda, Andre Boysen, Michael Varley, Abhishek Das, Hugh Cumming, Methods and systems for using derived credentials to authenticate a device across multiple platforms ,(2013)
Andrew P. Wyskida, Marco Pistoia, Benjamin L. Fletcher, John J. Ponzo, Eric J. Barkie, Authentication in virtual private networks ,(2013)
Oswaldo Gago, Mario E. De Armas, Gaurang Shah, Thomas C. Burke, Maria E. Smith, Applying policy attachment service level management (slm) semantics within a peered policy enforcement deployment ,(2013)
Sougata Mukherjea, Venkatraman Ramakrishna, Apurva Kumar, Policy Management of Multiple Security Domains ,(2012)