摘要 |
Among other things, use of and access to shared information on a network is managed by validating that a putative persistent identifier (Figure 5, eleme nt 120) asserted to be associated with a user (Figure 5, element 118) who is requesting to use information on a network is actually associated with the user, resolving the persistent identifier (Figure 5, element 74) to state information about the user (Figure 5, element 120) and a group (Figure 5, element 140) to which the user belongs and that is associated with the identifier, determining whether the state information (Figure 1, element 18) for the group contains the identifier associated with the user, and allowing access and/or use of the shared information based on the permissions allowed for the group (Figure 1, element 48).
|