Information security – Access control or authentication – Network
Reexamination Certificate
2011-03-01
2011-03-01
Jung, David Y (Department: 2431)
Information security
Access control or authentication
Network
C726S005000, C726S003000
Reexamination Certificate
active
07900248
ABSTRACT:
The subject disclosure pertains to systems and methods that facilitate managing groups entities for access control. A negative group is defined using a base group, where the negative group associated with a base group includes any entities not included in the base group. Negative groups can be implemented using certificates rather than explicit lists of negative group members. A certificate can provide evidence of membership in the negative group and can be presented for evaluation to obtain access to resources. Subtraction groups can also be used to manage access to resources. A subtraction group can be defined as the members of a first group, excluding any members of a second group.
REFERENCES:
patent: 5283830 (1994-02-01), Hinsley et al.
patent: 5315657 (1994-05-01), Abadi et al.
patent: 5765153 (1998-06-01), Benantar et al.
patent: 5825877 (1998-10-01), Dan et al.
patent: 6321334 (2001-11-01), Jerger et al.
patent: 6381602 (2002-04-01), Shoroff et al.
patent: 6412070 (2002-06-01), Van Dyke et al.
patent: 6487605 (2002-11-01), Leung
patent: 6625603 (2003-09-01), Garg et al.
patent: 6651096 (2003-11-01), Gai et al.
patent: 6986062 (2006-01-01), Carpenter
patent: 6990492 (2006-01-01), Gupta
patent: 7065783 (2006-06-01), Rygaard
patent: 7107446 (2006-09-01), Gensler, Jr. et al.
patent: 7131000 (2006-10-01), Bradee
patent: 7624424 (2009-11-01), Morita et al.
patent: 2003/0014636 (2003-01-01), Ahlbrand
patent: 2003/0084331 (2003-05-01), Dixon et al.
patent: 2003/0088786 (2003-05-01), Moran et al.
patent: 2004/0006621 (2004-01-01), Bellinson et al.
patent: 2004/0039906 (2004-02-01), Oka et al.
patent: 2005/0044396 (2005-02-01), Vogel et al.
patent: 2005/0044399 (2005-02-01), Dorey
patent: 2005/0055570 (2005-03-01), Kwan et al.
patent: 2005/0135623 (2005-06-01), Bahr
patent: 2005/0204133 (2005-09-01), LaLonde
patent: 2005/0278785 (2005-12-01), Lieberman
patent: 2006/0015741 (2006-01-01), Carroll
patent: 2006/0031679 (2006-02-01), Soltis, Jr. et al.
patent: 2006/0206707 (2006-09-01), Kostal et al.
patent: 2007/0220614 (2007-09-01), Ellis et al.
patent: 2007/0226488 (2007-09-01), Lin et al.
patent: 2008/0052291 (2008-02-01), Bender
patent: 2006012589 (2006-02-01), None
Analysis and Protection of Dynamic Membership Information for Group Key Distribution Schemes; Sun, Y.L.; Liu, K.J.R.; Information Forensics and Security, IEEE Transactions on vol. 2 , Issue: 2; Publication Year: 2007 , pp. 213-226.
Role-based access control for grid database services using the community authorization service; Pereira, A.L.; Muppavarapu, V.; Chung, S.M.; Dependable and Secure Computing, IEEE Transactions on vol. 3 , Issue: 2; Publication Year: 2006 , pp. 156-166.
An extended object-oriented security model for high secure office environments; Bao-Chyuan Guan; Ping Wang; Chen, S.-J.; Chang, R.-I.; Security Technology, 2003. Proceedings. IEEE 37th Annual 2003 International Carnahan Conference on Publication Year: 2003 , pp. 57-61.
Zhuo, On Fine-Grained Access Control for XML, http://uwspace.uwaterloo.ca/bitstream/10012/1058/1/dhzhuo2003.pdfCHAPTER 2., Waterloo Ontario Canada, 2003, 124 pages.
McCollum, et al., Beyond the Pale of MAC and DAC—Defining New Forms of Access Contmlt, http://ieeexplore.ieee.org/iel2/300/2323/00063850.pdf?isNumber=, Unisys Independent Research and Development,11 pages.
Biskup. et al., Towards a Credential-Based Implementation of Compound Access Control Policies, http://ls6-www.informatik.uni-dortmund.de/issi/archive/literature/2003/Biskup—Wortmann—2003a.pdf, Nov. 11, 2003, 23 pages, Dortmund Germany.
Swift, et al., Improving the Granularity of Access Control for Windows 2000, http://www.cs.wisc.edu/˜swift/papers/tissec.pdf, May 2001, 44 pages, Chantilly, VA, 6th ACM Symposium on Access Control Models and Technologies.
How to Manage ACLs, http://www.enterasys.com/support/manuals/RtrSvcsMgr2.1.1/docs/a—ht—manage—acls.html, Last accessed on Jun. 15, 2007, 6 pages.
Ellison, et al., SPKI Certificate Theory, http://www.ietf.org/rfc/rfc2693.txt, Sep. 1999, 41 pages, The Internet Society.
Dunn Melissa W.
Ellison Carl Melvin
Kaufman Charles William
Lach Paul J.
Lampson Butler Wright
Jung David Y
Microsoft Corporation
Wolf Greenfield & Sacks P.C.
LandOfFree
Access control negation using negative groups does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Access control negation using negative groups, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Access control negation using negative groups will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2768913