Computer program product method and computer in role-based...

Electrical computers and digital processing systems: virtual mac – Task management or control

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C717S100000, C712S220000

Reexamination Certificate

active

07441239

ABSTRACT:
A role-based computer system has a first processor with a computer program (100) and has further processors with application systems (Sy1, Sy2, Sy3) and application services (Se). The program generates a start instruction for the further processors to execute the services by consecutively receiving a log-in identification from the user and looking up in a first assignment table (101) for a role (Ro), looking up in a second assignment table (102) to determine logical services (LSe) assigned to the role; and looking up in a second assignment table to determine a pointer (P(Sy/Se)) to the services (Se) that are assigned to the logical service. The pointer has first and second portions to identify the application system (Sy) and the application service (Se), respectively, and becomes part of the start instruction (350).

REFERENCES:
patent: 5727155 (1998-03-01), Dawson
patent: 6073119 (2000-06-01), Bornemisza-Wahr et al.
patent: 2002/0188497 (2002-12-01), Cerwin
patent: 2004/0088197 (2004-05-01), Childress et al.
patent: 2004/0093525 (2004-05-01), Lamen
patent: 2005/0120012 (2005-06-01), Poth et al.
patent: 10-011506 (1998-01-01), None
patent: 10-162061 (1998-06-01), None
Author: Kami Brooks; Title: Migrating to role-based access control; Date: Oct. 28-29, 1999; Publisher: ACM New York, NY, USA.
David Ferraiolo, et al., “Specifying and Managing Role-Based Access Control Within a Corporate Intranet,” Proceedings of the Second ACM Workshop on Role-Based Access Control, Nov. 6-7, 1997, pp. 77-82.
D. McNutt “Role-Based System Administrator or Who, What, Where, and How,” Proceedings of the Systems Administration Conference, Lisa, Nov. 1, 1993, pp. 107-112.
D. Thomsen, et al., “Role based Access Control Framework for Network Enterprises,” Proceedings 14thAnnual Computer Security Applications Conference, Phoenix, Arizona, Dec. 7-11, 1998, pp. 50-58.
Satheesh A. Donthy, “Coordinator: A Java based Manufacturing Application,” Case Study, Jan. 10, 2000, http://www.members.tripod.com/sdonthy/case-study/casestudy.html, retrieved Aug. 30, 2001.
Sybase, Inc., “Enterprise Portal—Overview and User Guide,” Sybase Enterprise Portal Version 1.0 Documentation, May 2000, pp. 1-96. Document from the Internet: http://www.download.sybase.com/pdfdocs/epg0100e/ep—intro.pdf retrieved Aug. 30, 2001.
Yamazaki, et al., “Designing of RBAC Component for Security of Smart-office Environment”,Computer Security Symposium 2000, vol. 2000, No. 12, pp. 319-324, Information Processing Society of Japan, Oct. 26, 2000 (CSDB: National Academic Paper 200200121048), Japanese document, English translation abstract.
Enoki, et al., “A Study of Access Control for Sharing Enterprise Information”,Technical Report of IEICE, vol. 97, No. 493, pp. 13-18, OFS97-56, The Institute of Electronics, Information and Communication Engineers, Jan. 23, 1998 (CSDB: National Academic Ppaer 200202374003), Japanese document, English translation abstract.
Sekine, et al., “On Applying MSI Architecture to Tele-education Services”,NTT R&D, vol. 47, No. 3, pp. 311-318, The Telecommunications Association, Mar. 10, 1998 (CSDB: Enterprise Technical Report 199800076007) Japanese document; English translation abstract.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Computer program product method and computer in role-based... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Computer program product method and computer in role-based..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Computer program product method and computer in role-based... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4008421

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.