System and method for dynamic role association

Information security – Access control or authentication

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S003000, C726S004000, C709S217000, C709S219000

Reexamination Certificate

active

07823189

ABSTRACT:
A pluggable architecture allows security and business logic plugins to be inserted into a security service hosted by a server, and to control access to one or more secured resources on that server, on another server within the security domain, or between security domains. The security service may act as a focal point for security enforcement, and access rights determination, and information used or determined within one login process can flow transparently and automatically to other login processes. Entitlements denote what a particular user may or may not do with a particular resource, in a particular context. Entitlements reflect not only the technical aspects of the secure environment (the permit or deny concept), but can be used to represent the business logic or functionality required by the server provider. In this way entitlements bridge the gap between a simple security platform, and a complex business policy platform.

REFERENCES:
patent: 3748646 (1973-07-01), Schultz et al.
patent: 5369702 (1994-11-01), Shanton
patent: 5400248 (1995-03-01), Chisholm
patent: 5551040 (1996-08-01), Blewett
patent: 5764958 (1998-06-01), Coskun
patent: 5848352 (1998-12-01), Dougherty et al.
patent: 5872928 (1999-02-01), Lewis
patent: 5911143 (1999-06-01), Deinhart
patent: 5925126 (1999-07-01), Hsieh
patent: 5969715 (1999-10-01), Dougherty et al.
patent: 6052531 (2000-04-01), Waldin
patent: 6052723 (2000-04-01), Ginn
patent: 6055637 (2000-04-01), Hudson
patent: 6088679 (2000-07-01), Barkley
patent: 6108699 (2000-08-01), Moiin
patent: 6151599 (2000-11-01), Shrader et al.
patent: 6161139 (2000-12-01), Win
patent: 6182226 (2001-01-01), Reid
patent: 6202066 (2001-03-01), Barkley
patent: 6226745 (2001-05-01), Wiederhold
patent: 6243747 (2001-06-01), Lewis
patent: 6339423 (2002-01-01), Sampson
patent: 6357010 (2002-03-01), Viets
patent: 6574736 (2003-06-01), Andrews
patent: 6581054 (2003-06-01), Bogrett
patent: 6584454 (2003-06-01), Hummel et al.
patent: 6606708 (2003-08-01), Devine et al.
patent: 6651249 (2003-11-01), Waldin
patent: 6735624 (2004-05-01), Rubin
patent: 6751657 (2004-06-01), Zothner
patent: 6886100 (2005-04-01), Harrah
patent: 6957331 (2005-10-01), Kursawe et al.
patent: 6978379 (2005-12-01), Goh
patent: 7089584 (2006-08-01), Sharma
patent: 7093283 (2006-08-01), Chen
patent: 7185192 (2007-02-01), Kahn
patent: 7185332 (2007-02-01), Waldin
patent: 7219140 (2007-05-01), Marl
patent: 2001/0047485 (2001-11-01), Brown
patent: 2002/0107913 (2002-08-01), Rivera
patent: 2002/0147801 (2002-10-01), Gullotta
patent: 2002/0178119 (2002-11-01), Griffin
patent: 2002/0188869 (2002-12-01), Patrick
patent: 2003/0046576 (2003-03-01), High
patent: 2003/0126236 (2003-07-01), Marl
patent: 2003/0126464 (2003-07-01), McDaniel
patent: 2004/0215650 (2004-10-01), Shaji
patent: 697662 (1996-02-01), None
Ahn, Gail-Joon, et al., “Role-Based Authorization Constraints Specification Using Object Constraint Language,” WETICE 2001, pp. 157-162.
Faden, Glenn, “RBAC in UNIX Administration,” ACM Workshop on Role-Based Access Control, 1999, pp. 95-101.
Gustafsson, Mats, et al., Using NFS to Implement Role-based Access Control, WETICE, 1997, pp. 299-304.
Joshi, James, et al., “Security Models for Web-Based Applications,” Communications of the ACM, vol. 44, No. 2, Feb. 2001, pp. 38-44.
Na, Sang Yeob, et al., “Role Delegation in Role-Based Access Control,” ACM Workshop on Role-Based Access Control, 2000, pp. 39-44.
Oh, Sejong, et al., “Enterprise Model as a Basis of Administration on Role-Based Access Control,” CODAS 2001, pp. 150-158.
Park, Joon S., et al., “Role-Based Access Control on the web,” ACM Transactions on Information and System Security, vol. 4, No. 1, Feb. 2001, pp. 37-71.
Porwal, Priyank, “Automating Optimistic Access Control Systems,” (date unknown), pp. 1-10.
Povey, Dean, “Optimistic Security: A New Access Control Paradigm,” 1999.
Sandhu, Ravi S., et al., “The ARBAC97 Model for Role-Based Administration of Roles,” ACM Transactions on Information and System Security, vol. 2, No. 1, Feb. 1999, pp. 105-135.
Sandhu, Ravi S., et al., “The RRA97 Model for Role-Based Administration of Role Hierarchies,” ACSAC, 1998, pp. 39-49.
Sandhu, Ravi S., et al., “Role-Based Access Control Models,” IEEE Computer, vol. 29, No. 2, Feb. 1996, pp. 38-47.
Shim, Won Bo, et al., “Implementing Web Access Control System for the Multiple Web Servers in the Same Domain Using RBAC Concept,” ICPADS 2001, pp. 768-773.
Howes, T., “The String Representation of LDAP Search Filters,” Netscape Communications Corp., Network Working Group, RFC 2254, Dec. 1997, pp. 1-8.
Hayton, R.J., et al., “Access Control in an Open Distributed Environment,” 1998.
Bertino, Elisa, et al., “TRBAC: A Temporal Role-Based Access Control Model,” ACM Transactions on Information and System Security, vol. 4, No. 3, Aug. 2001, pp. 191-223.
Covington, Michael J., et al., “Securing Context-Aware Applications Using Environment Roles,” ACM Workshop on Role Based Access Control, Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies, 2001.
Yao, Walt, et al., “A Model of OASIS Role-Based Access Control and its Support for Active Security,” ACM Workshop on Role Based Access Control, Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies, 2001.
Tzelepi, Sofia K., et al., “A Flexible Content and Context-Based Access Control Model for Multimedia Medical Image Database Systems,” International Multimedia Conference, Proceedings of the 2001 Workshop on Multimedia and Security: New Challenges, Oct. 5, 2001.
Goh, Chen, et al., “Towards a More Complete Model of Role,” Symposium on Access Control Models and Technologies, Proceedings of the Third ACM Workshop on Role-based Access Control, 1998.
Okamoto, Eiji, “Proposal for Integrated Security Systems,” IEEE Computer Society Press, Jun. 1992, pp. 354-358.
http://java.sun.com/products/ejb/ (last visit: Dec. 7, 2004).
http://www.javaworld.com/javaworld/jw-12-2001/jw-1207-yesnoejb—p.html (last visit: Dec. 7, 2004).
http://portal.acm.org/citation.cfm?id=1011463, p. 1, last visited: Oct. 24, 2007.
Koved, et al., “Security challenges for Enterprise Java in an e-business environment,” IBM Systems Journal, vol. 40, No. 1, Jan. 2001, pp. 130-152.
Georgiadis, Christos K., et al., “Flexible Team-Based Access Control Using Contexts,” ACM Workshop on Role Based Access Control, Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies, 2001.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for dynamic role association does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for dynamic role association, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for dynamic role association will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4236447

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.