In an embodiment, the method includes, prior to said generating the data structure, receiving a task request from the first domain, wherein the access requirement to the secure data resource is associated with the task request and a task of the task request includes an operation required on the secure data resource, and causing a removal of the set of permissions and the access policy at the domain host for the first domain based on a completion indication for the task.
In an embodiment, the method includes, prior to said generating the data structure, receiving a task request from the first domain, the access requirement to the secure data resource being associated with the task request, the indication of the acceptance being included in the task request, and a task of the task request includes an operation required on the secure data resource.