Apparatus for wildcarded security policy and method therefor

Electrical computers and digital processing systems: support – System access control based on user identification by...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S168000, C713S170000

Reexamination Certificate

active

09896200

ABSTRACT:
An apparatus and method for wildcarded security policy are implemented. These include associating wildcarded resource identifiers with a corresponding security policy. A resource identifier received in an access request is matched to one of a list of said wildcarded resource identifiers, Matching is determined in accordance with a predetermined set of precedence values, each precedence value of the set corresponding to a predetermined wildcard element.

REFERENCES:
patent: 5442780 (1995-08-01), Takanashi et al.
patent: 5892904 (1999-04-01), Atkinson et al.
patent: 6012094 (2000-01-01), Leymann et al.
patent: 6088801 (2000-07-01), Grecsek
patent: 6108676 (2000-08-01), Nakatsuyama
patent: 6138238 (2000-10-01), Scheifler et al.
patent: 6158010 (2000-12-01), Moriconi et al.
patent: 6170012 (2001-01-01), Coss et al.
Pinker and Wear, Operating Systems, Concepts, Policies, and Mechanisms, Prentice Hall, 1989, pp. 4, 205-207.
http://www.eli.sdsu.edu/courses/spring99/cs696
otes/rmilntro/rmilntro.html.
http://livedocs.macromedia.com/jrun/4/JRun—Service—Pack—1—Guide/jndisecurity4.htm.
http://www.eli.sdsu.edu/courses/spring99/cs696
otes/security/security.html.
Partial identification of Lorenz system and its application to key space reduction of chaotic cryptosystems; Solak, E.; Circuits and Systems II: Express Briefs, IEEE Transactions on; vol. 51, Issue 10, Oct. 2004 pp. 557-560.
Verifiable identifiers in middleware security; Lang, U.; Gollmann, D.; Schreiner, R.; Computer Security Applications Conference, 2001. ACSAC 2001. Proceedings 17th Annual Dec. 10-14, 2001 pp. 450-459.
Real-time interception systems for the GSM protocol; Gonzalez-Castano, et al.; Vehicular Technology, IEEE Transactions on vol. 51, Issue 5, Sep. 2002 pp. 904-914.
IBM Technical Disclosure Bulletin, (vol. 38, No. 09) Sep. 1995, “Partial Containment Structure for Inegration of Distributed Computing Environment and Local Registries,” pp. 535-538.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Apparatus for wildcarded security policy and method therefor does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Apparatus for wildcarded security policy and method therefor, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Apparatus for wildcarded security policy and method therefor will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3775227

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.