Information security – Policy
Reexamination Certificate
2006-04-28
2010-11-16
Dada, Beemnet W (Department: 2435)
Information security
Policy
Reexamination Certificate
active
07836483
ABSTRACT:
A system architecture and algorithm for automatically generating, installing and enforcing access control policies that correspond to an agreed specification of collaboration. A collaboration member enforces its access control policies using a dedicated access controller separate from a workflow engine. In one embodiment, each access control policy contains extensions which can direct an access controller to selectively enable or disable various access control policies upon authorization of an access request.
REFERENCES:
patent: 7711832 (2010-05-01), Champion et al.
patent: 2005/0198206 (2005-09-01), Miller et al.
patent: 2006/0059029 (2006-03-01), Chalasani et al.
Foster et al. “Leveraging Eclipse for Integrated Model-Based Engineering of Web Service Compositions” Oct. 16-17, 2005, pp. 95-99.
Mendling et al—An Approach to Extract RBAC Models From BPEL4WS Processes—IEEE International Workshope on Enabling Technologies: Infrastructures for Collaborative Enterprises—2004 Modena, Italy—6 Pages.
Georgiadis et al—Flexible Team-Based Access Control Using Contexts—SACMAT 2001, May 3-4, 2001 Chantilly, VA—8 Pages.
Thomas et al—Conceptual Foundations for a Model of Task-Based Authorizations—7th IEEE Computer Security Foundations Workshop, Franconia, NH Jun. 1994—pp. 1-22.
Thomas et al—Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Authorization Management—IFIP WG11.3 Workshop on Database Security, Lake Tahoe, CA Aug. 11-13, 1997, 16 Pages.
Yao et al—A Model of Oasis Role-Based Access Control and Its Support for Active Security—SACMAT 01, May 3-4, 2001 Chantilly, VA—11 Pages.
Kang, et al, “Access Control Mechanisms for Inter-Organizational Workflow”, ACM Workshop on Role Based Access Control, Proceedings of the sixth ACM symposium on Acess control models and technologies, Chantilly, Virginia, United States, (2001), 9 pages.
Knorr, “Dynamic Access Control Through Petri Net Workflows”, Proceedings of the 16th Annual Computer Security Applications Confrence, (2000), 9 pages.
Kerschbaum Florian
Robinson Philip
Blakely & Sokoloff, Taylor & Zafman
Dada Beemnet W
SAP (AG)
LandOfFree
Automatic derivation of access control policies from a... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Automatic derivation of access control policies from a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Automatic derivation of access control policies from a... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4160308