Access control for elements in a database object

Data processing: database and file management or data structures – Database and file access – Database access control methods

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C707S783000, C707S999100, C707S999007

Reexamination Certificate

active

07865521

ABSTRACT:
A method, for controlling access to elements in a database object are provided. The method provide for receiving a request from a user to access the database object, determining whether an access restriction is imposed on the database object, and controlling access to the elements in the database object by the user based on the access restriction. The access restriction specifies one or more users to which the access restriction is applicable, defines a dynamic condition the one or more users must satisfy in order to access the database object, and identifies one or more of the elements in the database object accessible to the one or more users when the dynamic condition is satisfied.

REFERENCES:
patent: 5815574 (1998-09-01), Fortinsky
patent: 6026388 (2000-02-01), Liddy et al.
patent: 6085191 (2000-07-01), Fisher et al.
patent: 6308273 (2001-10-01), Goertzel et al.
patent: 6321235 (2001-11-01), Bird
patent: 6321334 (2001-11-01), Jerger et al.
patent: 6424974 (2002-07-01), Cotner et al.
patent: 6487552 (2002-11-01), Lei et al.
patent: 6643633 (2003-11-01), Chau et al.
patent: 6721727 (2004-04-01), Chau et al.
patent: 7133875 (2006-11-01), Chatterjee et al.
patent: 2003/0046550 (2003-03-01), Carroll et al.
patent: 2004/0139043 (2004-07-01), Lei et al.
patent: 2005/0246338 (2005-11-01), Bird
patent: 2007/0033196 (2007-02-01), Moore
patent: 2007/0038596 (2007-02-01), Pizzo et al.
patent: 2008/0275880 (2008-11-01), Bird et al.
Panagiotis Katsaros, “On the Design of Access Control to Prevent Sensitive Information Leakage in Distributed Object Systems: A Colored Petri Net Based Model”, SpringerLink Contemporary, Oct. 11, 2005, vol. 3761. Download: http://www.springerlink.com/content/5p71w09j9rlepaye/fulltext.pdf.
Hadjiefthymiades, SP et al., “A Generic Framework for the Deployment of Structured Databases on the World Wide Web,” Computer Networks and ISDN Systems, May 1996, vol. 28, No. 7-11, 9 pgs.
Zhenchuan, Xu et al., “Dynamic Tuning of XML Storage Schema in VXMLR,” IEEE 2003, Proceedings of the Seventh International Database Engineering and Applications Symposium, pp. 1-11.
International Search Report (ISR) dated Jan. 3, 2007, for corresponding foreign Application.
Rakesh Agrawal, et al., “Extending Relational Database Systems To Automatically Enforce Privacy Policies”, IBM Almaden Research Center, 650 Harry Road, San Jose, CA, Proceedings of the 21st International Conference on Data Engineering , IEEE, 2005.
Office Action dated Oct. 16, 2006; cited in U.S. Appl. No. 10/837,387.
Final Office Action dated May 4, 2007; cited in U.S. Appl. No. 10/837,387.
Office Action dated Oct. 18, 2007; cited in U.S. Appl. No. 10/837,387.
Office Action dated Apr. 23, 2008; cited in U.S. Appl. No. 10/837,387.
Office Action dated Apr. 10, 2009; cited in U.S. Appl. No. 10/837,387.
Tzelepi, S. et al., “Security of Medical Multimedia,” Medical Informatics and the Internet in Medicine, vol. 27, No. 3, Sep. 2002, pp. 169-184.
Damiani, E. et al., “Regulating Access to Semistructured Information on the Web,” Information Security for Global Information Infrastructures, Sixteenth Annual Working Conf. on Information Security, Aug. 22-24, 2000, Beijing, China, pp. 351-360.
Duesterwald, E. “A Practical Data Flow Framework for Array Reference Analysis and its use in Optimizations,” ACM Sigplan Notices vol. 28, No. 6, Jun. 1993, Proc of the ACM SIGPLAN '93 Conf. on Programming Language Design and Implementation Albuquerque, NM, Jun. 23-25, pp. 68-67.
Low, M. et al., “Fine Grained Object Protection in Unix,” Operating Systems Review vol. 27, No. 1, Jan. 1993, pp. 33-50.
Salemi, C. et al., “A Privilege Mechanism for UNIX System V Release 4 Operating Systems,” Conf. Proceedings, USENIX, Summer 1992 Technical Conf., San Antonio, Texas, Jun. 8-12, 1992, pp. 235-241.
Leiss, E. et al., “Protecting Statistical Databases by Combining Memoryless Table Restrictions With Randomizations,” AFIPS Conf., Proc., vol. 56, 1987 National Computer Conference, Jun. 15-18, 1987, Chicago, Illinois, pp. 591-600.
Damiani, E. et al., “A Fine-Grained Access Control System for XML Documents,” ACM Transactions on Information and System Security, vol. 5, No. 2, May 2002, pp. 169-202.
Grimm, R. et al., “Separating Access Control Policy, Enforcement, and Functionality in Extensible Systems,” ACM Transactions on Computer Systems, vol. 19, No. 1, Feb. 2001, pp. 36-70.
Coulouris, G. et al., “Security Requirements for Cooperative Work: A Model and Its System Implications,” Position Paper for 6th SIGOPS European Workshop, Dagstuhl, Sep. 1994, pp. 184-186.
Wang, Weigang, “Team-and-Role Based Organizational Context and Access Control for Cooperative Hypermedia Environments,” Hypertext 99, Darmstadt Germany, Copyright ACM 1999, pp. 37-46.
Böhlen, Michael H. et al., “Temporal Statements Modifiers,” ACM Transaction on Database Systems, vol. 25, No. 4, Dec. 2000, pp. 407-456.
Lakshmanan, Laks, V.S. et al., “SchemaSQL-An Extension to SQL for Multidatabase Interoperability,” ACM Transactions on Database Systems, vol. 26, No. 4, Dec. 2001, pp. 476-519.
Ng, Wilfred, “An Extension of the Relational Data Model to Incorporate Ordered Domains,” ACM Transactions on Database Systems, vol. 26, No. 3, Sep. 2001, pp. 344-383.
Hadjiefthymiades, SP et al., “A Generic Framework for the Deployment of Structured Databases on the World Wide Web,” Computer Networks and ISDN Systems, May 1996, vol. 28, No. 7-11, pp. 1139-1148. (Abstract).
Zhenchuan, Xu et al., “Dynamic Tuning of XML Storage Schema in VXMLR,” 2003, Proceedings International Database Engineering and Applications Symposium, pp. 76-86. (Abstract).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Access control for elements in a database object does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Access control for elements in a database object, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Access control for elements in a database object will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2709667

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.