Preserving data protection with policy

作者: Innokentiy Basmov , Alex M. Semenko , Narendra S. Acharya , Preston Derek Adam , Octavian T. Ureche

DOI:

关键词:

摘要: Data files are encrypted based on a key associated with an entity that sets data protection policy controlling access to the files. The identifies various restrictions how plaintext of in can be used. have corresponding metadata identifying policy, and processes running instances applications allowed also identifier entity. These identifiers entity, as well used by operating system computing device protect accordance including having transferred other devices protected data, or preventing from being devices.

参考文章(211)
John Houston Lowry, Jonathan A. Rubin, Cloud key management ,(2012)
Mary A. Marquez, Craig A. Klein, Michael L. Harper, Robert E. Medlin, Gregg S. Lucas, Replacing bad hard drive sectors using mram ,(2008)
Mallik Bulusu, Robert C. Swanson, Vincent J. Zimmer, Providing fast non-volatile storage in a secure environment ,(2011)
Eugene Shablygin, Oleg Bolotov, Mikhail Vysogorets, Eric Scace, Vasily Zakharov, Sharing secure data ,(2013)
Andrew Han, Poon Fung, Keng Lim, Protecting documents using policies and encryption ,(2011)
Ziyad Dahbour, Hierarchal data management ,(2006)
David Flynn, Robert Wipfel, David Nellans, John Strasser, Flynn, David, Systems and methods for atomic storage ,(2015)
Chel Park, Hyungsuk Kim, System and method for clipboard security ,(2010)