Structure of policies for evaluating key attributes of encryption keys

作者: Charles White , Stephen Edwards , Gary C. Gardner

DOI:

关键词:

摘要: Examples described herein relate to apparatuses and methods for evaluating an encryption key based on policies a policy operation, including, but not limited to, receiving user request the determining one or more of node, group, client, associated with request, priority, at least attribute based, in part, policies.

参考文章(150)
Antti Huima, Tatu J. Ylonen, Roman Hernandez, Tomi Salo, Self-service portal for provisioning passwordless access ,(2014)
Andrew Han, Poon Fung, Keng Lim, Protecting documents using policies and encryption ,(2011)
Tanya Ignatenko, Milan Petkovic, Muhammad Asim, Hierarchical attribute-based encryption and decryption ,(2012)
José Gaspar Cuevas, Multi-repository key storage and selection ,(2011)
Girish Bablani, Scott Colin Cottrille, Dennis Batchelder, Anatoliy Panasyuk, Service-based key escrow and security for device data ,(2009)