Information security – Prevention of unauthorized use of data including prevention...
Reexamination Certificate
2008-06-27
2011-11-15
El Hady, Nabil (Department: 2434)
Information security
Prevention of unauthorized use of data including prevention...
C726S001000, C726S002000, C726S027000
Reexamination Certificate
active
08060940
ABSTRACT:
A computer-implemented method for controlling access to data is. A request to access data is received. A determination is made that an access-control policy of the data is satisfied. A virtualization layer is activated to allow access to the data after determining that the access-control policy is satisfied. Various other methods, systems, and computer-readable media are also disclosed.
REFERENCES:
patent: 7636442 (2009-12-01), Scarlata et al.
patent: 2005/0055578 (2005-03-01), Wright et al.
patent: 2006/0020781 (2006-01-01), Scarlata et al.
patent: 2006/0161982 (2006-07-01), Chari et al.
patent: 2007/0300069 (2007-12-01), Rozas
patent: 2009/0249330 (2009-10-01), Abercrombie et al.
patent: 2009/0288167 (2009-11-01), Freericks et al.
Sailer, R. et al; “Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor;” Computer Security Application Conference, 21st; Dec. 5, 2005, pp. 276-285.
McCorkendale Bruce
Sobel William E.
Advantedge Law Group
El Hady Nabil
Symantec Corporation
LandOfFree
Systems and methods for controlling access to data through... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Systems and methods for controlling access to data through..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Systems and methods for controlling access to data through... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4308968