Information security – Policy
Reexamination Certificate
2007-12-25
2007-12-25
Song, Hosuk (Department: 2135)
Information security
Policy
C726S003000, C713S166000
Reexamination Certificate
active
10453873
ABSTRACT:
Techniques for providing application layer security may be facilitated by an arbitrator. In general, in one implementation, an arbitrator may receive a security tender including security requirements for an application, search for security services to fulfill the security requirements, determine whether discovered security services can satisfy the security requirements, and, if security services that can satisfy the security requirements exist, generate a security contract for the application, the security contract specifying how the application is to communicate with the security services that can satisfy the security requirements.
REFERENCES:
patent: 5935248 (1999-08-01), Kuroda
patent: 6892307 (2005-05-01), Wood et al.
patent: 7089584 (2006-08-01), Sharma
Atkinson, Bob, et al., “Web Services Security (WS-Security) Version 1.0,” Apr. 5, 2002, International Business Machines Corporation, Microsoft Corporation, VeriSign, Inc., retrieved from the Internet on Jun. 18, 2004, at http://www-106.ibm.com/developerworks/webservices/library/ws-secure/, 28 pgs.
Avolio, Frederick M., “Firewalls: A Brief History,” 2000, slideshow, retrieved from the Internet at http://www.avolio.com/pres/FirewallsHistory—files/, 18 pgs.
Bellovin, Steven M., “Distributed Firewalls,” ;login:, Nov. 1999, pp. 37-39, retrieved from the Internet on Jun. 18, 2004, at http://www.research.att.com/˜smb/papers/distfw.pdf, 11 pgs.
Box, Don, et al., “Simple Object Access Protocol (SOAP) 1.1: W3C Note, May 8, 2000,” retrieved from the Internet on Jun. 18, 2004, at http://www.w3.org/TR/SOAP, 35 pgs.
Celestial, “A Security Management Architecture for Providing Survivable Security Services in Heterogeneous Networking Environments,” Apr. 1999, retrieved from the Internet at http://projects.anr.mcnc.org/Celestial/Celestial.html, 3 pgs.
Cheswick, Bill, “An Evening with Berferd in Which a Cracker is Lured, Endured, and Studied,” AT&T Bell Laboratories, 1991, retrieved from the Internet at http://www.tracking-hackers.com/papers/berferd.pdf, 11 pgs.
Cisco, “Understanding Internet Security Risks,” retrieved from the Internet on Jun. 18, 2004, at http://www.dtr.com.br/cdrom/cc/cisco/mkt/isol/secur/centr/centr—wp.htm.
CORBA Security, “CORBA Security Conformance Statement,” Nov. 28, 2000, retrieved from the Internet on Aug. 20, 2004, at http://doc.ece.uci.edu/TAO/Security/Conformance.html, 4 pgs.
Ellermann, Uwe, “IPv6 and Firewalls,”DFN-CERT, University of Hamburg, Jun. 1996, retrieved from the Internet on Jun. 22, 2004, at http://www.dfn-cert.de/eng/team/ue/fw/ipv6fw, 15 pgs.
“Ernst & Young and Computer Associates Forge Alliance to Deliver World-Class Information Security and Risk Management Services,” PR Newswire, Apr. 22, 2002, retrieved from the Internet on Jun. 24, 2004, at http://www.prnewswire.com/gh/cnoc/comp/196575.html, 2 pgs.
“Final Report: 13th Annual HIMSS Leadership Survey Sponsored by Superior Consultant Company,” 2002, retrieved from the Internet on Jun. 24, 2004, at http://www.himss.org/2002survey/print—versions.htm, 28 pgs.
Freed, N., “Behavior of and Requirements for Internet Firewalls,” retrieved from the Internet on Jun. 18, 2004, at ftp://ftp.isi.edu/in-notes/rfc2979.txt, 7 pgs.
Hofmann, Markus, et al. “Open Pluggable Edge Services (opes),” retrieved from the Internet on Jun. 18, 2004, at http://www.ietf.org/html.charters/opes-charter.html, 4 pgs.
The Honeynet project, “Know Your Enemy: Statistics,” Jul. 22, 2001, retrieved from the Internet on Jun. 18, 2004, at http://project.honeynet.org/papers/stats, 7 pgs.
Imielinski, Tomasz, et al., “Mobile Wireless Computing: Solutions and Challenges in Data Management,” WINLAB Rutgers University, 1993, retrieved from the Internet at http://citeseer.ist.psu.edu/cache/papers/cs/269/ftp:zSzzSzwww.cs.rutgers.eduzSzpubzSztechnical-reportszSzdcs-tr-296.pdf/imielinski93mobile.pdf, 38 pgs.
Ipsec IETF working group, “IP Security Protocol (ipsec),” retrieved from the Internet on Jun. 22, 2004, at http://www.jetf.org/html.charters/ipsec-charter.html, 3 pgs.
“IP Spoofing Demystified,” Jun. 1996, retrieved from the Internet on Jun. 18, 2004, at http://ftp.cdut.edu.cn/pub/document/book/IP-spoof.pdf, 12 pgs.
Julian, Ted, et al., “The Forrester Report: Turning Security On Its Head,” Forrester Research Inc., Jan. 1999, retrieved from the Internet on Nov. 16, 2004, at http://www.atstake.com/company—info/acrobat/turning—security—on—head.pdf, 15 pgs.
Kaspersky Labs, “‘Worm’ Crawls into the KaZaA Network,” May 18, 2002, retrieved from the Internet on Jun. 18, 2004, at http://www.kaspersky.com
ews.html?id=738605, 1 pg.
Keadle, Laura, “Comparison Shopping For Scalable Firewall Products,” SANS Institute, Aug. 13, 2001, retrieved from the Internet at http://rr.sans.org/firewall/shopping.php, 9 pgs.
Kelly, Kevin, “New Rules for the New Economy: 10 Radical Strategies for a Connected World,” Viking, 1998, retrieved from the Internet on Jun. 24, 2004, at http://www.kk.org
ewrules, 101 pgs.
King, Steve, et al., “The Case for IPv6,” Internet Architecture Board, Dec. 25, 1999, retrieved from the Internet on Jun. 22, 2004, at http://www.6bone.net/misc/case-for-ipv6.html, 50 pgs.
Leiner, Barry M., et al., “The Past and Future History of the Internet,”Communications of the ACM, Feb. 1997, vol. 40, No. 2, pp. 102-108.
McCurley, Kevin S., “Cryptography and the Internet: Lessons and Challenges,” abstract for an invited talk at AsiaCrypt '96, retrieved from the Internet on Jun. 22, 2004, at http://www.swcp.com/˜mccurley/pubs/outline.html, 6 pgs.
Meadows, Catherine, “A Formal Framework and Evaluation Method for Network Denial of Service,” PCSFW: Proceedings of the 12th Computer Security Foundations Workshop, 1999, retrieved from the Internet at http://chacs.nrl.navy.mil/publications/CHACS/1999/1999meadows-CSFW99.pdf, 11 pgs.
Morrissey, Peter, “Follow the Mellow Brick Road,” Lucent Technical Material, Network Computing Magazine, Nov. 12, 2001, retrieved from the Internet at http://ww.lucent.com/livelink/220746—TechnicalMaterial.pdf, 4 pgs.
Oasis, “Technical Overview of the OASIS Security Assertion Markup Language (SAML) V1.1,” May 11, 2004, retrieved from the Internet on Jun. 22, 2004, at http://www.oasis-open.org/committees/security/#documents, 19 pgs.
Odlyzko, Andrew, “The History of Communications and its Implications for the Internet,” AT&T Labs—Research, Jun. 16, 2000, retrieved from the Internet at http://www.dtc.umn.edu/˜odlyzko/doc/history.communications0.pdf, 160 pgs.
Perkins, Charles E., et al., “Mobility Support in IPv6,”Proceedings of the Second Annual International Conference on Mobile Computing and Networking(MobiCom '96), Nov. 10-12, 1996, New York, USA, retrieved from the Internet on Jun. 24, 2004, at http://www.monarch.cs.cmu.edu/monarch-papers/mobicom96.ps, 11 pgs.
Posegga, Joachim, et al., “Wireless Internet Security,” Informatik Spektrum, Dec. 24, 2001, pp. 383-386 [translation provided].
Ranum, Marcus J., “Thinking about Firewalls,” Digital Equipment Corporation, Washington Open Systems Resource Center, 1994, 10 pgs., retrieved from the Internet on Jun. 24, 2004, at http://www.deter.com/unix/papers/firewalls—ranum.pdf.
“Squid Web proxy Cache,” retrieved from the Internet on Jun. 18, 2004, at http://www.squid-cache.org, 12 pgs.
Richmond, Robert, “Personal Firewall Comparison,” Nov. 4, 2000, retrieved from the Internet on Jun. 18, 2004, at http://www.sysopt.com/reviews/firewall, 23 pgs.
Schiller, Jeffrey I., “Encryption and Security Requirements for IETF Standard Protocols,” Jul. 2001, retrieved from the In
Haller Jochen
Robinson Philip
Fish & Richardson P.C.
SAP Aktiengesellschaft
Song Hosuk
LandOfFree
Application level security does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Application level security, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Application level security will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3897928