Zone based security administration for data items
Administering digital security is disclosed. Data and method items are stored on a computer system in a volume. The volume is divided up into non-overlapping security zones. Each item exists in a security zone. Security rules are granted to principals where the security rules apply to items in a par...
Saved in:
Main Authors | , , , , |
---|---|
Format | Patent |
Language | English French German |
Published |
06.06.2012
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Be the first to leave a comment!