The 'how' and 'why' of persistent information security

  • Authors:
  • Merv Matson;Mihaela Ulieru

  • Affiliations:
  • RightsX Inc., Calgary, Canada;The University of New Brunswick, Fredericton, Canada

  • Venue:
  • Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
  • Year:
  • 2006
  • Usage control enforcement - a survey

    ARES'11 Proceedings of the IFIP WG 8.4/8.9 international cross domain conference on Availability, reliability and security for business, enterprise and health information systems

Quantified Score

Hi-index 0.00

Visualization

Abstract

A file level information security technology that applies everywhere, every time, is introduced. The security is always 'on', as much 'in the wild' as behind the firewall or in the VPN tunnel. The broad strokes of structure and operation are discussed in terms of a specific system, RightsEnforcer. The technology is currently being deployed in the Adaptive Risk Management Lab at the University of New Brunswick as part of a testbed supporting emergency response operations.