Information security – Access control or authentication – Network
Reexamination Certificate
2008-07-22
2008-07-22
Zand, Kambiz (Department: 2134)
Information security
Access control or authentication
Network
C726S002000, C726S003000, C726S004000, C726S005000, C726S001000, C713S170000, C713S165000, C713S166000, C713S167000
Reexamination Certificate
active
10430967
ABSTRACT:
A system and methods for applying capability-based authorization within a distributed computing environment. Instead of associating permissions or privileges with objects (e.g., computing resources), permissions are associated with subjects (e.g., users, roles). Compared to object-based methods of access control, such as Access Control Lists (ACL), management of capability-based authorizations scales much better as the number of objects becomes very large. A central repository allows changes to the authorization framework (e.g., new subjects, modified permissions) to be made once. The changes can then be propagated across, and applied to, multiple address spaces instead of having to individually or manually update each local node or address space.
REFERENCES:
patent: 5815665 (1998-09-01), Teper et al.
patent: 6938158 (2005-08-01), Azuma
patent: 7036142 (2006-04-01), Zhang et al.
patent: 7039804 (2006-05-01), Fichtner et al.
patent: 7069437 (2006-06-01), Williams
patent: 7076784 (2006-07-01), Russell et al.
patent: 7131000 (2006-10-01), Bradee
patent: 7133907 (2006-11-01), Carlson et al.
patent: 7139999 (2006-11-01), Bowman-Amuah
patent: 7167844 (2007-01-01), Leong et al.
patent: 7185047 (2007-02-01), Bate et al.
patent: 2004/0015723 (2004-01-01), Pham et al.
RBAC '99, Proceedings of the Fourth ACM Workshop on Role-Based Access Control, Oct. 28-29, 1999, Fairfax, VA, USA. ACM 1999.□□.
Thomas, R. “Role-Based Access Control and Distributed Object-Based Enterprise Computing”, 1996, Association for Computing Machinery, ACM RBAC Workshop, MD, USA., pp. II-99-II-102.
Freudenthal et al., “dRBAC: Distributed Role-based Access Control for Dynamic Coalition Environments”, 2002, Proceedings of the 22nd International Conference on Distributed Computing Systems. (ICDCS'02).
Giuri et al., Role-Based Access Control on the Web Using Java:, 1999, ACM, pp. 11-18.
Hilmann et al., “Managing Trust between Collaborating Companies using outsourced Role-Based Access Control”, 1999, ACM, pp. 105-130.
Linn et al., “Attributes Certification: An Enabling Technology for Delegation and Role-Based Controls in Distributed Environment”, 1999, ACM, pp. 121-130.
Oracle International Corporation
Park Vaughan & Fleming LLP
Tran Tongoc
Zand Kambiz
LandOfFree
Distributed capability-based authorization architecture does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Distributed capability-based authorization architecture, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Distributed capability-based authorization architecture will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3903978