作者: Nicholas Stamos , Donato Buccella , Dwayne A. Carson
DOI:
关键词:
摘要: A technique for adaptive encryption of digital assets such as computer files. The system model monitors passage files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse access rights. In accordance with a preferred embodiment, an autonomous independent agent process running at point use, background in client operating kernel, interrupts requests resources. senses low level events, filters, aggregates them. policy engine analyzes sequences aggregate events determine when apply encryption.