Associating security information with information objects

Information security – Access control or authentication – Authorization

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S176000, C713S170000, C713S166000, C713S167000, C726S004000

Reexamination Certificate

active

07975295

ABSTRACT:
A hash key is generated based on an information object and a lookup operation is performed in a hash table based on the hash key. A determination is made whether an entry in the hash table at an index corresponding to the hash key identifies a labelset for the information object. A labelset, identifying a sensitivity of the information object, is stored in the entry at the index corresponding to the hash key for the information object if a labelset for the information object is not identified in the entry in the hash table. Information flows involving the information object are authorized based on a lookup of the labelset associated with the information object in the hash table. The hash table may be a multidimensional hash table.

REFERENCES:
patent: 5249265 (1993-09-01), Liang
patent: 5765153 (1998-06-01), Benantar et al.
patent: 5845068 (1998-12-01), Winiger
patent: 5991877 (1999-11-01), Luckenbaugh
patent: 6178508 (2001-01-01), Kaufman
patent: 6192361 (2001-02-01), Huang
patent: 6292900 (2001-09-01), Ngo et al.
patent: 6324637 (2001-11-01), Hamilton
patent: 6324647 (2001-11-01), Bowman-Amuah
patent: 6449613 (2002-09-01), Egolf et al.
patent: 6490626 (2002-12-01), Edwards et al.
patent: 6523067 (2003-02-01), Mi et al.
patent: 6766314 (2004-07-01), Burnett
patent: 6792424 (2004-09-01), Burns et al.
patent: 6854016 (2005-02-01), Kraenzel et al.
patent: 6912528 (2005-06-01), Homer
patent: 6928439 (2005-08-01), Satoh
patent: 7107610 (2006-09-01), Lortz
patent: 7340469 (2008-03-01), Alghathbar et al.
patent: 7512792 (2009-03-01), Arroyo et al.
patent: 7574409 (2009-08-01), Patinkin
patent: 7647630 (2010-01-01), Arroyo et al.
patent: 7793100 (2010-09-01), Arroyo et al.
patent: 2002/0035635 (2002-03-01), Holden et al.
patent: 2002/0099952 (2002-07-01), Lambert et al.
patent: 2003/0023954 (2003-01-01), Wilkinson et al.
patent: 2004/0148521 (2004-07-01), Cohen et al.
patent: 2006/0053285 (2006-03-01), Kimmel et al.
patent: 2007/0143601 (2007-06-01), Arroyo et al.
patent: 2007/0143604 (2007-06-01), Arroyo et al.
patent: 2007/0204044 (2007-08-01), Rice et al.
patent: 2008/0229413 (2008-05-01), Arroyo et al.
patent: 2009/0119507 (2009-05-01), Arroyo et al.
patent: 0 605 106 (1994-07-01), None
patent: 0 849 680 (1998-06-01), None
patent: 10-326256 (1998-12-01), None
patent: 2000138711 (2000-05-01), None
patent: 2003179628 (2003-06-01), None
Carpenter et al., “Abstract interdomain security assertions: A basis for extra-grid virtual organizations”, IBM Systems Journal, vol. 43, No. 4, 2004, pp. 689-701.
Hess et al., “Content-Triggered Trust Negotiation”, ACM Transactions on Information and System Security, vol. 7, No. 3, Aug. 2004, pp. 428-456.
Crampton, Jason, “A Reference Monitor for Workflow Systems with Constrained Task Execution”, SACMAT '05, Jun. 1-3, 2005, Stockholm, Sweden, pp. 38-47.
Gladney, H.M., “Access Control for Large Collections”, ACM Transactions on Information Systems, vol. 15, No. 2, Apr. 1997, pp. 154-194.
Kon et al., “Monitoring, Security, and Dynamic Configuration with the dynamicTAO Reflective ORB*”, J. Sventek and G. Coulson (Eds.): Middleware 2000, LNCS 1795, pp. 121-143.
Feustel et al., “The DGSA: Unmet Information Security Challenges for Operating System Designers”, 1997, pp. 3-22.
Lin et al., “Integration of DCE and Local Registries: Design Approaches”, 1st Conf.—Computer & Comm. Security '93-Nov. 1993, VA, USA, pp. 165-170.
Lin et al., “Defining Autonomic Computing: A Software Engineering Perspective”, Proc. 2005 Australian Software Engineering Conference (ASEWC'05), 2005, 10 pages.
Dionisio et al., “A Unified Data Model for Representing Multimedia, Timeline, and Simulation Data”, IEEE Transactions on Knowledge and Data Engineering, vol. 10, No. 5, Sep./Oct. 1998, pp. 746-767.
Kang et al., “An Integrated Access Control in Heterogeneous Distributed Database Systems”, Microprocessing & Microprogramming, vol. 35, No. 1-5, Sep. 1992, pp. 429-436.
Roe et al., “Integrating Cryptography in the Trusted Computing Base”, Proc. of the Sixth Annual Computer Security Applications Conference (Cat. No. 90TH0351-7), 1990, pp. 50-56.
Shin et al., “File protection with operating system security”, Abstract, Korea Information Science Society Review, vol. 7, No. 5, 1989, 1 page.
Denning et al., “Views for Multilevel Database Security”, IEEE Transactions on Software Engineering, vol. SE-13, No. 2, Feb. 1987, pp. 129-140.
Garvey et al., “ASD—VIEWS”, IEEE, Proceedings of the 1988 IEEE Symposium on Security and Privacy, Apr. 18-21, 1988, pp. 85-95.
USPTO U.S. Appl. No. 11/304,853, Image File Wrapper printed on Oct. 21, 2010, 3 pages.
USPTO U.S. Appl. No. 11/304,933, Image File Wrapper printed on Oct. 21, 2010, 3 pages.
USPTO U.S. Appl. No. 11/304,971, Image File Wrapper printed on Oct. 21, 2010, 4 pages.
USPTO U.S. Appl. No. 12/130,252, Image File Wrapper printed on Jan. 4, 2011, 4 pages.
USPTO U.S. Appl. No. 12/350,327, Image File Wrapper printed on Oct. 21, 2010, 4 pages.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Associating security information with information objects does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Associating security information with information objects, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Associating security information with information objects will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2660082

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.