Composite document access

作者: Helen Balinsky , Vali Ali , Lorri L. Jefferson

DOI:

关键词:

摘要: According to one example, a first computer system receives at least request by workflow participant access composite document content-part from second system. The retrieves encrypted bundle the for participant, decrypts using private key, and ascertains whether rule retrieved decrypted is satisfied. In event that satisfied, releases token content-part.