CODE MONITORING AND RESTRICTING OF EGRESS OPERATIONS
One example method of operation may include identifying an attempted action taken to code, determining whether to block the attempted action based on one or more of user profile access rights assigned to a user profile and a code permission assigned to the code, and responsive to determining whether...
Saved in:
Main Authors | , , |
---|---|
Format | Patent |
Language | English |
Published |
16.03.2023
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Be the first to leave a comment!