Enhanced system, method and medium for certifying and...

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S005000, C726S006000

Reexamination Certificate

active

09946164

ABSTRACT:
A computer-assisted system, method and medium for enabling a user to select at least one of a plurality of predefined process steps to create a tailored sequence of process steps that can be used to assess the risk of and/or determine the suitability of a target system to comply with at least one predefined standard, regulation and/or requirement.

REFERENCES:
patent: 5032979 (1991-07-01), Hecht et al.
patent: 5621889 (1997-04-01), Lermuzeaux et al.
patent: 5625751 (1997-04-01), Brandwajn et al.
patent: 5684959 (1997-11-01), Bhat et al.
patent: 5699403 (1997-12-01), Ronnen
patent: 5740248 (1998-04-01), Fieres et al.
patent: 5796942 (1998-08-01), Esbensen
patent: 5850516 (1998-12-01), Schneier
patent: 5859847 (1999-01-01), Dew et al.
patent: 5892900 (1999-04-01), Ginter et al.
patent: 5892903 (1999-04-01), Klaus
patent: 5931946 (1999-08-01), Terada et al.
patent: 6006328 (1999-12-01), Drake
patent: 6134664 (2000-10-01), Walker
patent: 6148401 (2000-11-01), Devanbu et al.
patent: 6151599 (2000-11-01), Shrader et al.
patent: 6185689 (2001-02-01), Todd, Sr. et al.
patent: 6205407 (2001-03-01), Testa et al.
patent: 6219626 (2001-04-01), Steinmetz et al.
patent: 6219628 (2001-04-01), Kodosky et al.
patent: 6219805 (2001-04-01), Jones et al.
patent: 6230105 (2001-05-01), Harris et al.
patent: 6256773 (2001-07-01), Bowman-Amuah
patent: 6282546 (2001-08-01), Gleichauf et al.
patent: 6298445 (2001-10-01), Shostack et al.
patent: 6317868 (2001-11-01), Grimm et al.
patent: 6324647 (2001-11-01), Bowman-Amuah
patent: 6389402 (2002-05-01), Ginter et al.
patent: 6405364 (2002-06-01), Bowman-Amuah
patent: 6408391 (2002-06-01), Huff et al.
patent: 6370573 (2002-08-01), Bowman-Amuah
patent: 6473794 (2002-10-01), Guheen et al.
patent: 6546493 (2003-04-01), Magdych et al.
patent: 7020697 (2006-03-01), Goodman et al.
patent: 2001/0027389 (2001-10-01), Beverina et al.
patent: 2001/0034847 (2001-10-01), Gaul, Jr.
patent: 2002/0042687 (2002-04-01), Tracy et al.
patent: 2002/0069035 (2002-06-01), Tracy et al.
patent: 2002/0104014 (2002-08-01), Zobel et al.
patent: 2002/0198750 (2002-12-01), Innes et al.
patent: 2002/0199122 (2002-12-01), Davis et al.
patent: 2003/0046128 (2003-03-01), Heinrich
patent: 2003/0064717 (2003-04-01), Rajaram
patent: 2003/0065793 (2003-04-01), Kouznetsov et al.
patent: 2003/0159063 (2003-08-01), Apfelbaum et al.
patent: 2003/0163728 (2003-08-01), Shaw
patent: 2003/0172166 (2003-09-01), Judge et al.
patent: 2004/0010709 (2004-01-01), Baudoin et al.
patent: 2004/0025015 (2004-02-01), Satterlee et al.
patent: 2004/0049698 (2004-03-01), Ott et al.
patent: 0999489 (2000-05-01), None
patent: WO 00/70463 (2000-11-01), None
patent: WO 01/37511 (2001-05-01), None
patent: WO 01/59989 (2001-08-01), None
patent: WO 01/99349 (2001-12-01), None
patent: WO 02/061544 (2002-08-01), None
Using model checking to analyze network vulnerabilities Ritchey, R.W.; Ammann, P.; Security and Privacy, 2000. S&P 2000. Proceedings. 2000 IEEE Symposium on May 14-17, 2000 pp. 156-165.
http://www.ansto.gov.au/research/research—home/library/useful—links/standards,—regulations—and—test—methods.html, year 2007.
http://www.hitrust.com.hk/whitepaper/whitepaper—Security—Intelligence—and—ControlSM—Services—the—New—Age—of—Information—Security.pdf, year 2007.
Responsible agent behavior: a distributed computing perspective Mamdani, E.; Pitt, J.; Internet Computing, IEEE vol. 4, Issue 5, Sep.-Oct. 2000 pp. 27-31.
Tests and tolerances for high-performance software-implemehted fault detection Turmon, M.; Granat, R.; Katz, D.S.; Lou, J.Z.; Computers, IEEE Transactions on vol. 52, Issue 5, May 2003 pp. 579-591.
Validation of Component-Based Software with a Customer Centric Domain Level Approach Skroch, Oliver; Engineering of Computer-Based Systems, 2007. ECBS ′07. 14th Annual IEEE International Conference and Workshops on the Mar. 26-29, 2007 pp. 459-466.
International Search Report from PCT Application No. PCT/US02/09842.
Polk, W.T. Dec. 1992. “Automated Tools for testing computer system vulnerability (Abstract).” National Institute of Standards & Technology. Washington, DC.
Hochberg, Judith, Kathleen Jackson, Cathy Stallings, J.F. McClary, David Dubois, and Josephine Ford. May 3, 1993. “NADIR: An automated system for detecting network instrusion and misuse (Abstract).” Computers & Security, vol. 12, No. 3, pp. 235-248.
U.S. Appl. No. 09/794,386, filed Feb. 28, 2001, Tracy et al.
U.S. Appl. No. 09/822,868, filed Apr. 02, 2001, Tracy et al.
Baskerville, Richard. Dec. 4, 1993. “Information Systems Security Design Methods: Implications for Information Systems Development.” ACM Computing Surveys, vol. 25, No. 4, pp. 375-414.
Zhou, Qin, J. Davidson, and A.A. Fouad. Feb. 1994. “Application of artificial neural networks in power system security and vulnerability assessment (Abstract).” IEEE Transactions on Power Systems, vol. 9, No. 1, pp. 525-532.
Jackson, K. A., J. G. Hochberg, S. K. Wilhelmy, J. F. McClary, and G. G. Christoph. May 3-5, 1994. “Management issues in automated audit analysis (Abstract).” Los Alamos National Lab, Department of Energy computer security group training conference, Denver, Colorado.
Jackson, K. A., M. C. Neuman, D. D. Simmonds, C. A. Stallings, and J. L. Thompson. May 1-4, 1995. “Misuse and intrusion detection at Los Alamos National Laboratory (Abstract).” Department of Energy computer security group training conference (17th). Milwaukee, Wisconsin.
Casella, K. A. Sep. 17-22, 1995. “Security administration in an open networking environment (Abstract).” Proceedings of the Ninth Systems Administration Conference, pp. 67-73. Monterey, California.
Doty, T. Fall 1995. “Test Driving SATAN (Abstract).” Computer Security Journal, vol. 11, No. 2, pp. 9-14.
Karygiannis, T. Mar. 23-25, 1998. “Network security testing using moblie agents (Abstract).” Proceedings of the Third International Conference on the Practical Application of Intelligent Agents and a Multi-Agent Technology, pp. 625-626. London, United Kingdom.
Gimble, T. F., M. F. Ugone, C. A. Miggins, D.L. Dixon, and K. Fitzpatrick. Jun. 3, 1998. “Information Assurance for the Defense Civilian Personnel Data System—Washington, Headquarters Services (Abstract).” Audit Report, Department of Defense, Office of the Inspector General. Washington, DC.
Swiler, L. P. and C. Phillips. Jun. 30, 1998. “Graph-based system for network-vulnerability analysis (Abstract). ” USDOE Office of Financial Management and Controller. Washington DC.
Rudd, Alan, Joel McFarland, and Scott Olsen. Aug. 1998. “Managing security vulnerabilities in a networked world (Abstract).” Journal of Digital Imaging, vol. 11, No. 3, Suppl. 1, pp. 216-218.
Mar. 1999. “DoD Information Technology Security Certificate and Accreditation Process (DITSCAP) (on CD-ROM) (Abstract).” Defense Information Systems Agency. Arlington, Virginia.
Levine, Diane E. May 24, 1999. “CyberCop Patrols on Linux: Network Associates Scanner Detects Security, System Vulnerabilities.”Information Week.
Jun. 1999. “Intrusion detection [mark survey] (Abstract).”Secure Computing(International Edition), pp. 58-60, 62, 64, 66, 68. United Kingdom.
Rogers, Amy. Jul. 9, 1999. “Testing for Network Vulnerabilities: VARs Can Build Lucrative Practices Around Emerging Products.”ChannelWEB.
Mixer, R.A. Jul. 26, 1999. “Common Database Format for Network Security Data (Master's Thesis) (Abstract).” Air Force Institute of Technology, Wright Patterson AFB, Ohio.
Apr. 2000. “Secure Strategies: A Year Long Series On The Fundamentals of Information Systems Security.” www.infosecuritymag.com/articles/april00/features4.shtml
Mayer, A., A. Wool, and E. Ziskind. May 14-17, 2000. “Fang: A firewall analysis engine (Abstract).” Proceeding 2000 IEEE S

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Enhanced system, method and medium for certifying and... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Enhanced system, method and medium for certifying and..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Enhanced system, method and medium for certifying and... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3905557

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.