A secure pointer. The secure pointer can include an encrypted pointer to a
resource disposed in a communicatively coupled computing device. The
secure pointer also can include a network address of a server computing
device able to locate the resource based upon a decrypted form of the
encrypted pointer. Finally, the secure pointer can include an encrypted
wrapper about the encrypted pointer and the network address. Notably, the
encrypted pointer can be encrypted and decrypted according to a local
encryption/decryption key known to the server computing device. Yet, the
encrypted wrapper can be encrypted according to a public encryption key
while the encrypted wrapper can be decrypted according to a private
encryption key corresponding to the public encryption key.