Abstract:
Document management system includes a composite document (CD) and a mixed workflow, which includes an unordered stage followed by one of i) an ordered stage or ii) another unordered stage. The system includes a map-file (map) of the document (CD) for a participant (P) in the mixed workflow that is associated with the ordered or other unordered stage, and a wrap (W) of the map-file (map). Wrap (W) includes a number of map-file fragments (F) equal to or greater than a number of workflow participants (P) within a group (G) associated with the unordered stage. The number of map-file fragments (F) renders the document (CD) inaccessible to the participant (P) that is associated with the ordered or other unordered stage until each of the number of map-file fragments (F) is released by each of the workflow participants (P) within the group (G).
Abstract:
System call interception is activated for an application process. It is recorded that system call interception is active for the application process. Ongoing checking is performed to determine whether system call interception remains active.
Abstract:
System call interception is activated for an application process. It is recorded that system call interception is active for the application process. Ongoing checking is performed to determine whether system call interception remains active.
Abstract:
In a method for providing differential access to a digital document among workflow participants, in which at least one of the workflow participants is outside of a common secure environment (300), a first set of keys including an encryption key, a signature key, and a verification key is associated with atomic unit(s) (304). The atomic unit(s) is encrypted using the encryption key and signed using the signature key (306, 308). A level of access to the atomic unit(s) to be granted to each of the workflow participants and the keys in the first set of keys to supply to each of the workflow participants based upon the identified level of access are identified (310, 312). In addition, each of the workflow participants is supplied with the identified one or more keys (314) and the encrypted and signed atomic unit(s) is supplied to a first workflow participant (316).
Abstract:
Input is obtained to modify one of a set of self-consistent and prioritized document policies, each policy indicating an allowability of a requested action when a condition of the policy is satisfied. Each policy is representable by a node on a multipartite graph, the node being located in a part of the multipartite graph that corresponds to the allowability indicated by the policy. Two nodes are connectable by an edge that indicates a relative priority between their corresponding policies. A transitive closure of the representation is computed so as to identify paths of contiguous edges that connect pairs of nodes. When two policies with different allowabilities are applicable to a single requested action on a single document, and when the corresponding nodes are connected by one of the identified paths, a relative priority is automatically assigned to the two policies as indicated by the path.
Abstract:
A document management system includes a document. One or more of a plurality of map-files of the document correspond(s) with a step of a multi-step workflow associated with the document. A random nonce is generated for each of the steps of the multi-step workflow except for an initial step of the multi-step workflow. Each of the random nonces i) is incorporated as a map-file entry into a respective one of the plurality of map-files corresponding with a step of the multi-step workflow that directly precedes the step of the multi-step workflow for which the random nonce is generated and ii) is used to perform a nonce-based initiating operation a respective one of the plurality of map-files corresponding with the step of the multi-step workflow for which the random nonce is generated.
Abstract:
A method and system for collaboratively editing a composite document having a plurality of original document parts. For each of one or more original document parts, a non-editable version of the original document part may be stored. Edits to the original document part may be stored in a plurality of edit parts. Each of the plurality of edit parts may be editable by a single associated one of a plurality of users and may be non-editable by all other users of the plurality of users. The plurality of edit parts may be individually encrypted and the edit parts may be stored separately from the original document parts.
Abstract:
A method for conducting a privacy ensured computerized poll includes, in a computerized anonymizing system (100), receiving a list (404) of invited participants (418) of said computerized poll, said list (404) comprising at least one address (202, 204) for each said participant (418). With said computerized anonymizing system (100), assigning each invited participant (418) in said poll at least one character string (410, 412) and transmitting to each invited participant (418) said at least one character string (410, 412) assigned to said participant (418) using said at least one address (202, 204). With said computerized anonymizing system (100), generating a list (408) comprising an entry for each said at least one character string (410, 412) assigned to one of said invited participants (418) and shuffling an order of said entries, and providing said shuffled list (408) to a poll initiator (402).
Abstract:
A transclusion method provides for transclude copying a source fragment of a source document into a target document. As a result, the target document contains a target fragment. The target fragment is a copy of the source fragment. A reference to the source document is included with the target fragment in the target document. The reference identifies a location for the source document and provides search data for locating the source fragment within the source document.
Abstract:
A modular document is composed of plural parts, where at least a particular one of the parts is associated with an access right policy that restricts access to the particular part. In response to a request to access the modular document, it is determined based on the access right policy whether content of the particular part is accessible in an electronic device. In response to determining that the content of the particular part is inaccessible in the electronic device, an access mechanism associated with the particular part is accessed to determine an action to take with respect to the particular part when presenting the modular document.