Data structure for access control

Information security – Access control or authentication

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S001000

Reexamination Certificate

active

10642499

ABSTRACT:
Data structures for use in controlling access to data objects by users of a computer system or computing device are described. The data structures include an access control group data structure, a user access data structure, and a data object access data structure. The access control group data structure stores access control group data. The user access data structure stores user access data. The user access data relates to at least one entry in the access control group data structure. The data object access data structure stores data object access data, which relates to at least one entry in the access control group. Additional data structures described include an access control rule data structure and a characteristic method data structure.

REFERENCES:
patent: 5539906 (1996-07-01), Abraham et al.
patent: 5941947 (1999-08-01), Brown et al.
patent: 6023765 (2000-02-01), Kuhn
patent: 6088679 (2000-07-01), Barkley
patent: 6470339 (2002-10-01), Karp et al.
patent: 6470353 (2002-10-01), Yaung et al.
patent: 6484258 (2002-11-01), Haverty
patent: 6513039 (2003-01-01), Kraenzel
patent: 6535879 (2003-03-01), Behera
patent: 6539380 (2003-03-01), Moran
patent: 6578037 (2003-06-01), Wong et al.
patent: 6591265 (2003-07-01), Erickson et al.
patent: 2002/0026592 (2002-02-01), Gavrila et al.
patent: 2002/0178119 (2002-11-01), Griffin et al.
patent: 2002/0184535 (2002-12-01), Laracuente et al.
patent: 0697662 (1996-02-01), None
patent: 0913966 (1999-05-01), None
patent: 0 992 873 (2000-04-01), None
Wikipedia on line Encyclopedia; URL: http://en.wikipedia.org/wiki/Relational—model (pp. 11 and 12) and http://en.wikipedia.org/wiki/Relational—database—management—system (p. 5).
Barkley, et al. “Managing Role/Permission Relationships Using Object Access Types,”Proceedings of the 3rdACM Workshop on Role-Based Access Control, New York, US, Oct. 22-23, 1998, pp. 73-80.
Deng, et al., “A Dynamic Access Control Model for Object-Oriented System,”Institute of Electrical and Electronics Engineers, New York, US, Oct. 13-15, 1993, pp. 159-163.
Schaad, et al. “The Role-Based Access Control System of a European Bank: A Case Study and Discussion,”Proceedings of The 6thACM Symposium on Access Control Models and Technologies, Chantilly, VA, May 3-4, 2001, pp. 3-9.
Sandhu, et al. “Access Control: Principles and Practice,”IEEE Communications Magazine, Sep. 1, 1994, vol. 32, No. 9, pp. 40-48.
“XACML: A New Standard Protects Content in Data Exchange,” Jun. 24, 2003, 7 pages, reprinted from http://developer.java.sun.com/developer/technicalArticles/Security/xacml/xacml.html.
“Sun's XACML Implementation,” Jun. 23, 2003 Update, 2 pages, reprinted from http://sunxacml.sourceforge.net.
“OASIS: XACML Implementers Guide,” Hal Lockhart, ed., Jun. 12, 2002, 5 pages.
“OASIS: Web-Services Policy Language Use-Cases and Requirements, Working Draft 04,” Tim Moses, ed., Apr. 16, 2003, 23 pages.
“OASIS: eXtensible Access Control Markup Language (XACML) Version 1.0, OASIS Standard,” Simon Godik and Tim Moses, eds., Feb. 18, 2003, 132 pages.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Data structure for access control does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Data structure for access control, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Data structure for access control will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3831752

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.