Techniques for providing pervasive security to digital assets are
disclosed. According to one aspect of the techniques, a server is
configured to provide access control (AC) management for a user (e.g., a
single user, a group of users, software agents or devices) with a need to
access secured data. Within the server module, various access rules for
the secured data and/or access privileges for the user can be created,
updated and managed so that the user with the proper access privileges
can access the secured documents if granted by the corresponding access
rules in the secured data.