作者: Stephen Edwards
DOI:
关键词:
摘要: Examples described herein relate to apparatuses and methods for evaluating an encryption key based on policies a policy operation, including, but not limited to, aggregating existing at least one attribute of the key, executing replacement operation replacing with ephemeral policy, based, in part, policy.