Evaluating initially untrusted evidence in an evidence-based...

Information security – Prevention of unauthorized use of data including prevention... – Access control

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S027000

Reexamination Certificate

active

07131143

ABSTRACT:
An evidence-based policy manager generates a permission grant set for a code assembly received from a resource location. The policy manager executes in a computer system (e.g., a Web client or server) in combination with the verification module and class loader of the run-time environment. The permission grant set generated for a code assembly is applied in the run-time call stack to help the system determine whether a given system operation by the code assembly is authorized. Both code assemblies and evidence may be received from a local origin or from a remote resource location via a network (e.g., the Internet). Evidence having different levels of trust may be evaluated in combination so that a permission grant set is associated only with trusted code assemblies. The policy manager may comprise execution modules for parsing a security policy specification, generating one or more code hierarchies, evaluating membership of the received code assembly in one or more code groups, and generating a permission grant set based upon this membership evaluation.

REFERENCES:
patent: 5915085 (1999-06-01), Koved
patent: 5958050 (1999-09-01), Griffin et al.
patent: 5978484 (1999-11-01), Apperson et al.
patent: 6044466 (2000-03-01), Anand et al.
patent: 6044467 (2000-03-01), Gong
patent: 6052678 (2000-04-01), Itoh et al.
patent: 6125447 (2000-09-01), Gong
patent: 6463535 (2002-10-01), Drews
patent: 6687823 (2004-02-01), Al-Salqan et al.
patent: WO 99/30217 (1999-06-01), None
“Decentralized Trust Management”, by M. Blaze, J. Feigenbaum, J. Lacy, in Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 164-173. Also available as a DIMACS Technical Report. This paper describes PolicyMaker. Available in Postscript at http://www.research.att.com/˜jf/pubs/oakland96proc.ps.
“Proceedings of the Sixth International World Wide Web Conference”, Santa Clara, CA, Apr. 1997, by Y. Chu, J. Feigenbaum, B. LaMacchia, P. Resnick, M. Strauss, REFEREE: Trust Management for Web Applications. Available from http://www.farcaster.com/papers/www6-referee/index.htm.
“The Role of Trust Management in Distributed System Security”, M. Blaze, J. Feigenbaum, J. Ioannidis, A. Keromytis, Secure Internet Programming: Security Issues for Distributed and Mobile Objects, Lecture Notes in Computer Science, vol. 1603, Springer, Berlin, 1999, pp. 185-210. Postscript available from http://www.research.att.com/˜jf/pubs/sip99.ps.
“Managing Trust in an Information-Labeling System”, European Transactions on Telecommunications, 8 (1997), pp. 491-501. (Special issue of selected papers from the 1996 Amalfi Conference on Secure Communication in Networks.) Postscript from http://www.research.att.com/˜jf/pubs/ett97.ps.
“The Evolution of Java Security”, by Koved, Nadalin, Neal and Lawson, including information on Java-based systems, IBM.
Information on KeyNote including “The KeyNote Trust-Management System” from RFC 2704, at http://www.cis.upenn.edu/˜angelos/keynote.html; and “Using the KeyNote Trust Management System” by Matt Blaze, at http://www.crypto.com/trustimgt/.
“Trust management on the World Wide Web”, by Khare and Rifkin, at http://www.7.scu.edu.au/programme/posters/1902/com1902.htm.
“Compliance Checking in the PolicyMaker Trust Management System”, by Blaze, Feigenbaum and Strauss, AT&T Labs-Research.
International Search Report for PCT/US01/16057.
International Search Report for PCT/US01/16127.
Anand, R. et al.., “A Flexible Security Model for Using Internet Content,” Proceedings of the 16thSymposium on Reliable Distributed Systems. SRDS '97, Durham, NC, Oct. 22-24, 1997 & Proceedings of the Symposium on Reliable Distributed Systems, Los Alamitos,CA: IEEE Computer Soc, US, Oct. 22, 1997.
“Logically Extensible Privilege Control Set,” IBM Techical Disclosure Bulletin, IBM Corp., New York, NY, vol. 34, No. 7B, Dec. 1, 1991.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Evaluating initially untrusted evidence in an evidence-based... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Evaluating initially untrusted evidence in an evidence-based..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Evaluating initially untrusted evidence in an evidence-based... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3652047

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.