Enforcing computer security utilizing an adaptive lattice...

Information security – Prevention of unauthorized use of data including prevention...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C709S223000

Reexamination Certificate

active

10798074

ABSTRACT:
Method and apparatus for ensuring secure access to a computer system (1000). The method can begin with the step of receiving in the computer system a request from an entity (using1002). The entity can have a predetermined access authorization level for access to a first base node (110) representing an information type (102) or a computer system function (104). The system determines if the access request completes a prohibited temporal access pattern for the entity. The system also compares a minimum access level established for the first base node to the predetermined access authorization level assigned to the entity. Thereafter, the system can grant the access request only if the minimum access level for the first base node does not exceed to the predetermined access authorization level.

REFERENCES:
patent: 5887065 (1999-03-01), Audebert
patent: 5970246 (1999-10-01), Moughani et al.
patent: 6023765 (2000-02-01), Kuhn
patent: 6334121 (2001-12-01), Primeaux et al.
patent: 6345361 (2002-02-01), Jerger et al.
patent: 6405202 (2002-06-01), Britton et al.
patent: 6408391 (2002-06-01), Huff et al.
patent: 6446077 (2002-09-01), Straube et al.
patent: 6446206 (2002-09-01), Feldbaum
patent: 6453418 (2002-09-01), Ooki et al.
patent: 2002/0138322 (2002-09-01), Umezawa et al.
patent: 2004/0044655 (2004-03-01), Cotner et al.
patent: 2004/0107345 (2004-06-01), Brandt et al.
patent: 2004/0123159 (2004-06-01), Kerstens et al.
patent: 2004/0193891 (2004-09-01), Ollila
patent: 2005/0229000 (2005-10-01), Shoji et al.
patent: WO 03/088018 (2003-10-01), None
Meadows, C., “Extending the Brewer-Nash Model to a Multilevel Context” IEEE, Proceedings of the Symposium on Research in Security and Privacy. Oakland, May 7-9, 1990.
Stickel, M., “Elimination of Inference Channels by Optimal Upgrading” Research in Security and Privacy, 1994, IEEE Computer Society Symposium in Oakland, CA, May 16-18, 2004, IEEE Comput. Soc, pp. 168-174.
Denning, D., “A Lattice Model of Secure Information Flow” Communications of the ACM, vol. 19, No. 5, May 1976, pp. 236-243.
Null, L., et al., “A Unified Approach for Multilevel Database Security Based on Inference Engines” SIGCSE Bulletin, ACM, New York, NY Feb. 23, 1989, pp. 108-111.
Samarati, et al., “Access Control: Policies, Models, and Mechanisms” Lecture Notes in Computer Science, Springer Verlag, New York, NY vol. 2171, Jun. 2003, pp. 137-196.
Sandhu, R., “Lattice-Based Access Control Models” Online: URL:http//doi.ieeecomputersociety.org/10.1109/2.241422> retrieved on Oct. 25, 2005.
Brewer, D., et al., “The Chinese Wall Security Policy” Proceedings of the Symposium on Security and Privacy. Oakland, May 1-3, 1989, Washington, IEEE Comp. Soc. Press, US.
Sandhu, R., “The Typed Access Matrix Model” IEEE, Proceedings of the Computer Society Sypmsium on Research in Security and Privacy, Oakland, May 4-6, 1992, Los Alamitos, IEEE Comp. Soc. Press, US., vol. SYMP. 13, pp. 122-136.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Enforcing computer security utilizing an adaptive lattice... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Enforcing computer security utilizing an adaptive lattice..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Enforcing computer security utilizing an adaptive lattice... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3817878

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.