CONTEXT AWARE DATA PROTECTION
0 Assignments
0 Petitions
Accused Products
Abstract
A method, for context aware data protection is provided. Information about an access context is received in a data processing system. A resource affected by the access context is identified. The identification of the resource may include deriving knowledge about resource by making an inference from a portion of contents of the resource that the access context affects the resource, making an inference that the access context affects a second resource thereby inferring that the resource has to be modified, determining that the access context is relevant to the resource, or a combination thereof. The resource is received. A policy that is applicable to the access context is identified. A part of the resource to modify according to the policy is determined. The part is modified according to the policy and the access context to form a modified resource. The modified resource is transmitted.
63 Citations
25 Claims
-
1-10. -10. (canceled)
-
11. A computer usable program product comprising a computer usable storage medium including computer usable code for context aware data protection, the computer usable code comprising:
-
computer usable code for receiving information about an access context in a data processing system; computer usable code for identifying a resource affected by the access context; computer usable code for receiving the resource; computer usable code for identifying a policy corresponding to the access context; computer usable code for determining a part of the resource to modify according to the policy; computer usable code for modifying the part according to the policy and the access context to form a modified resource; and computer usable code for transmitting the modified resource. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A data processing system for context aware data protection, the data processing system comprising:
-
a storage device including a storage medium, wherein the storage device stores computer usable program code; and a processor, wherein the processor executes the computer usable program code, and wherein the computer usable program code comprises; computer usable code for receiving information about an access context in a data processing system; computer usable code for identifying a resource affected by the access context; computer usable code for receiving the resource; computer usable code for identifying a policy corresponding to the access context; computer usable code for determining a part of the resource to modify according to the policy; computer usable code for modifying the part according to the policy and the access context to form a modified resource; and computer usable code for transmitting the modified resource.
-
-
21. A computer implemented method for context aware data protection, the computer implemented method comprising:
-
providing a set of parameters representing a state model, the state model representing an access context in a data processing system; providing a set of policies in a policy repository, the set of policies being usable for managing access to a set of resources, resources in the set of resources being data; detecting a change in the access context by detecting a change in a parameter in the set of parameters; identifying a resource affected by the access context change; identifying a policy corresponding to the access context change; identifying a context unaware access control enforcement component that manages access to the resource; modifying the context unaware access control enforcement component according to the policy thereby managing access to the resource with awareness of the access context change. - View Dependent Claims (22, 23, 24, 25)
-
Specification