Abstract

A customer (first party) uses an application developed by an application service provider (second party). A third party needs legitimate access to data of the customer stored on a server operated by the application service provider. In such a scenario, the third party requests the customer to permit the third party to access to such data. However, in some instances, the type of access requested by the third party is broad. This disclosure describes techniques to restrict the types of data that are made available to the third party by enabling a customer to tag data stored by the provider. Further, the customer can specify rules that govern sharing of tagged data with the third party.

Controlling access by tagging data

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.

Share

COinS