摘要 |
The application relates to a computer having a processor configured to execute a set of instructions (7) to render a customized version of a restricted document object model (DOM) such as a web page received over a network from a server (11). A restricted element in a DOM is identified and at least one rule associated with the restricted element is accessed. The at least one rule includes removing, hiding or obfuscating the restricted elements and unwrapping links or disabling functionality such as buttons in the restricted elements . In addition user computer functions such as save, print etc. may be disabled. The application also relates to server-side authentication techniques; content filtering based on user-specific and context-based requirements; and audit trail techniques. |