The ability to beneficially employ collaboration tools, shared computer processing and storage assets – absent prior arrangement, recurring coordination, trusted-third-parties, or global secrets – whether these resources and services are locally or remotely deployed, privately owned, or accessed on a fee basis. This capability must enable:

  1.    Cloud security, which is completely controlled by the Users rather than Providers

  1.    Users to freely choose different resource (computing and storage assets) and service (collaboration applications and utilities) Providers from task to task

  1.    Perimeter-less operating-environments, where locality has no bearing on security 

Content Security