Automatic derivation of access control policies from a...

Information security – Policy

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

07836483

ABSTRACT:
A system architecture and algorithm for automatically generating, installing and enforcing access control policies that correspond to an agreed specification of collaboration. A collaboration member enforces its access control policies using a dedicated access controller separate from a workflow engine. In one embodiment, each access control policy contains extensions which can direct an access controller to selectively enable or disable various access control policies upon authorization of an access request.

REFERENCES:
patent: 7711832 (2010-05-01), Champion et al.
patent: 2005/0198206 (2005-09-01), Miller et al.
patent: 2006/0059029 (2006-03-01), Chalasani et al.
Foster et al. “Leveraging Eclipse for Integrated Model-Based Engineering of Web Service Compositions” Oct. 16-17, 2005, pp. 95-99.
Mendling et al—An Approach to Extract RBAC Models From BPEL4WS Processes—IEEE International Workshope on Enabling Technologies: Infrastructures for Collaborative Enterprises—2004 Modena, Italy—6 Pages.
Georgiadis et al—Flexible Team-Based Access Control Using Contexts—SACMAT 2001, May 3-4, 2001 Chantilly, VA—8 Pages.
Thomas et al—Conceptual Foundations for a Model of Task-Based Authorizations—7th IEEE Computer Security Foundations Workshop, Franconia, NH Jun. 1994—pp. 1-22.
Thomas et al—Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Authorization Management—IFIP WG11.3 Workshop on Database Security, Lake Tahoe, CA Aug. 11-13, 1997, 16 Pages.
Yao et al—A Model of Oasis Role-Based Access Control and Its Support for Active Security—SACMAT 01, May 3-4, 2001 Chantilly, VA—11 Pages.
Kang, et al, “Access Control Mechanisms for Inter-Organizational Workflow”, ACM Workshop on Role Based Access Control, Proceedings of the sixth ACM symposium on Acess control models and technologies, Chantilly, Virginia, United States, (2001), 9 pages.
Knorr, “Dynamic Access Control Through Petri Net Workflows”, Proceedings of the 16th Annual Computer Security Applications Confrence, (2000), 9 pages.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Automatic derivation of access control policies from a... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Automatic derivation of access control policies from a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Automatic derivation of access control policies from a... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4160308

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.