Automatic generation of policies and roles for role based...

Information security – Policy

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S002000, C726S003000

Reexamination Certificate

active

08042150

ABSTRACT:
A method (400) of automatically generating policies and/or roles for role based access (RBAC). The method can include presenting a policy or policy generation table (300) identifying scripts (304) and roles (302) to which the scripts correspond to an operator, and receiving at least one operator input selecting a plurality of desired scripts to be associated with a desired policy or role. The method also can include parsing the scripts to identify corresponding verb-switches (204), and comparing the parsed verb-switches to existing policies or roles (114). When there is at least one of the parsed verb-switches that does not correspond to at least one existing policy, the parsed verb-switch that does not correspond to at least one existing policy can be identified and a policy (106) that includes the identified verb-switch can be generated.

REFERENCES:
patent: 6202066 (2001-03-01), Barkley et al.
patent: 6327618 (2001-12-01), Ahlstrom et al.
patent: 7607164 (2009-10-01), Vasishth et al.
patent: 2004/0225893 (2004-11-01), Ng
patent: 2005/0138419 (2005-06-01), Gupta et al.
patent: 2005/0138420 (2005-06-01), Sampathkumar et al.
patent: 2005/0193196 (2005-09-01), Huang et al.
patent: 2006/0089932 (2006-04-01), Buehler et al.
patent: 2006/0112426 (2006-05-01), Smith et al.
patent: 2007/0056018 (2007-03-01), Ridlon et al.
patent: 2007/0056019 (2007-03-01), Allen et al.
patent: 2007/0214352 (2007-09-01), Convery et al.
patent: 2007/0240231 (2007-10-01), Haswarey et al.
patent: 2008/0184336 (2008-07-01), Sarukkai et al.
patent: 2008/0295145 (2008-11-01), Haswarey et al.
patent: 0250691 (2002-06-01), None
patent: 03107178 (2003-12-01), None
patent: 2004109971 (2004-12-01), None
Data Acquisition Backbone Core DABC; Adamczewski, J.; Essel, H.G.; Kurz, N.; Linev, S.; Real-Time Conference, 2007 15th IEEE-NPSS; Publication Year: 2007 , pp. 1-5.
Rapid and low-cost context-switch through embedded processor customization for real-time and control applications Xianarong Zhou; Petrov, P.; Design Automation Conference, 2006 43rd ACM/IEEE Publication Year: 2006 , pp. 352-357.
The real-time ObjectAgent software architecture for distributed satellite systems; Surka, D.M.; Brito, M.C.; Harvey, C.G.; Aerospace Conference, 2001, IEEE Proceedings.; vol. 6 Publication Year: 2001, pp. 2731-2741 vol. 6.
Masood, Ammar et al.: “Test Generation for Access Control Systems that Employ RBAC Policies”, SERC-TR-285, Purdue University, 2005, pp. 1-13.
Grsecurity website, grsecurity for SELinux, http://www.grsecurity.net/features.php (1of 4) downloaded Dec. 5, 2008.
M. Nyanchama, S. Osborn: “The Role Graph Model and Conflict of Interest” Online Feb. 1,1999, URL: portal.acn.org/citation.cfm?if=300830. pp. 3-33.
Al-Kahtani, Mohammad A. et al.: Induced Role Hierarchies with Attribute-Based RBAC, SACMAT'03, Jun. 2-3, 2003, Como, Italy, Copyright 2003 ACM 1-58113-681-1/03/0006, pp. 142-148.
Ferraiolo, David F. et al.: A Role-Based Access Control Model and Reference Implementation Within a Corporate Intranet, 1999 ACM 1094-9224/99/0200-0034, ACM Transactions on Information and System Security, vol. 2, No. 1, Feb. 1999, pp. 34-64.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Automatic generation of policies and roles for role based... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Automatic generation of policies and roles for role based..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Automatic generation of policies and roles for role based... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4281676

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.