Policy-enabled encryption keys having ephemeral policies

作者: Stephen Edwards

DOI:

关键词:

摘要: Examples described herein relate to apparatuses and methods for evaluating an encryption key based on policies a policy operation, including, but not limited to, aggregating existing at least one attribute of the key, executing replacement operation replacing with ephemeral policy, based, in part, policy.

参考文章(168)
Prakash Yamuna, Jeffrey Jason Bryan, Nickolas Kavantzas, Attaching web service policies to a group of policy subjects ,(2011)
Antti Huima, Tatu J. Ylonen, Roman Hernandez, Tomi Salo, Self-service portal for provisioning passwordless access ,(2014)
Scott D. Anderson, Magnus Bo Gustaf Nystrom, Robert Karl Spiger, Douglas M. Maciver, David J. Linsley, Protecting operating system configuration values ,(2012)
Andrew Han, Poon Fung, Keng Lim, Protecting documents using policies and encryption ,(2011)
Tanya Ignatenko, Milan Petkovic, Muhammad Asim, Hierarchical attribute-based encryption and decryption ,(2012)