摘要:
In a method (300) for applying differential policies on at least one digital document (120a-120n) having a plurality of atomic units (122a-122n) among a plurality of workflow participants (110a-110n), in which the atomic units are assigned with at least one of a plurality of the differential policies, the at least one digital document is tessellated (304) to identify the atomic units and the at least one of the differential policies assigned to the atomic units. In addition, the atomic units are aggregated (306) according to the at least one of the differential policies assigned to the atomic units and respective sets of keys are associated (308) to the aggregated atomic units, in which common sets of keys are associated with the aggregated atomic units assigned with the same policies.
摘要:
A system and method is disclosed for document policy enforcement. The method discloses: scanning document parts for a set of policy-eliciting terms; assigning a policy to a document part based on a policy-eliciting term found within the document part; and enforcing the policy. The system discloses a computer programmed with executable instructions which operate a set of modules, wherein the modules comprise: a policy editor and a policy daemon, for effecting the method.
摘要:
Examples disclosed herein relate to request authorization and authentication. Examples include to intercept a request from a processing pipeline of a device. The device to determine ether the request is authorized and authentic. The device to generate a cancellation request if the request is not authorized or not authenticated. The device to provide the cancellation request to the processing pipeline of the device.
摘要:
According to an example of accessing a composite document, a request to access a composite document is received. A key associated with a group is fetched, and the key is used to decrypt a part of the composite document comprising an attribute. In the event that the attribute is verified, access to the composite document is provided.
摘要:
In a method for providing differential access to a digital document among workflow participants, in which at least one of the workflow participants is outside of a common secure environment (300), a first set of keys including an encryption key, a signature key, and a verification key is associated with atomic unit(s) (304). The atomic unit(s) is encrypted using the encryption key and signed using the signature key (306, 308). A level of access to the atomic unit(s) to be granted to each of the workflow participants and the keys in the first set of keys to supply to each of the workflow participants based upon the identified level of access are identified (310, 312). In addition, each of the workflow participants is supplied with the identified one or more keys (314) and the encrypted and signed atomic unit(s) is supplied to a first workflow participant (316).