Adaptive transparent encryption

作者: Nicholas Stamos , Donato Buccella , Dwayne A. Carson

DOI:

关键词:

摘要: A technique for adaptive encryption of digital assets such as computer files. The system model monitors passage files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse access rights. In accordance with a preferred embodiment, an autonomous independent agent process running at point use, background in client operating kernel, interrupts requests resources. senses low level events, filters, aggregates them. policy engine analyzes sequences aggregate events determine when apply encryption.

参考文章(16)
Johnnie C. McCarty, System for computer software protection ,(1994)
William J. Caelli, Jason F. Reid, DRM, trusted computing and operating system architecture grid computing. pp. 127- 136 ,(2005)
Tse Huong Choo, Network adapter management ,(2002)
Vasily Zolotov, Ernst Carter, Network surveillance and security system ,(2001)
Douglas H. Steves, Abhai Johri, Tsung T. Wei, Matthew S. Hecht, Distributed security auditing subsystem for an operating system ,(1990)
Bryan Douglas Williams, Timothy P. Farley, Philip Charles Brass, Derek John Mezack, George C. Young, John M. Hammer, Method and System for Managing Computer Security Information ,(2001)
David Vaskevitch, Mark H. Lucovsky, Tandy W. Trower, David G. Campbell, Amit Mital, Steven M. Cellini, Eric D. Rudder, Steve Capps, Keith W. Short, Peter M. Spiro, Vivek Gundotra, Joseph D. Belfiore, Kaviraj Singh, Charles T. Fitzgerald, Paul A. Maritz, Distributed computing services platform ,(2001)
Nicholas Stamos, Donato Buccella, Tomas Revesz, William E Fletcher, Seth N Birnbaum, Keith A Macdonald, Dwayne A Carson, Managed distribution of digital assets ,(2004)