Jump to content United States-English
HP.com Home Products and Services Support and Drivers Solutions How to Buy
» Contact HP

hp.com home


Information Flow Control




printable version
» 

HP Labs

» Research
» News and events
» Technical reports
» About HP Labs
» Careers @ HP Labs
» People
» Worldwide sites
» Downloads
Content starts here


What's the problem?

  • Currently applications are responsible for enforcing data security policy - bad idea!
  • We want controls on how data may flow independently of what an application (or attacker in charge of an application) may allow
  • We want these controls to fit in naturally with the needs of higher level business policies
  • We want controls over ANY application without requiring application modification / specialized applications

What are we doing?

  • Capture and tagging of "invisible" data use / flow within a process
  • OS policy enforcement framework (Linux/Windows)
  • Overall solution combines IBE, tagged OS and TCPA (Trusted Computing Platform Alliance) certification

For more information contact:
Richard Brown, Department Manager richard.brown@hp.com



Solutions and Services

» Technology for Services
» Trust, Security and Privacy
» Legal and Regulatory
» Manageability
» Trusted Platforms
» Identity Management
» Boundary Management
» Threat Management
» Trust Management
» Digital Proofing
» Innovation for Emerging Economies
» New Competitive Spaces
Privacy statement Using this site means you accept its terms Feedback to HP Labs
© 2009 Hewlett-Packard Development Company, L.P.