Event-based database access execution

Data processing: database and file management or data structures – Database design – Data structure types

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C707S793000, C707S793000, C707S793000

Reexamination Certificate

active

07120635

ABSTRACT:
An authorisation privilege for an access request is inferred when no explicit privilege exists. The inference can be performed by way of mining occurrence patterns or derived from user hierarchy, profile, click history, transaction history or role. For any access request, the respective explicit privilege or inferred privilege is verified by the database or security administrator before the access request is permitted. Conditions expressed in an access policy are evaluated on the occurrence of predefined events. The events extend beyond user access requests, and include external events, composite events and access of a referential type. The access policy is framed in ‘event, condition, access enforcement’ terminology. The access control rules can be parameterised and can be instantiated by data obtained from inference rules associated with the conditions of the policy. The conditions have an evaluation component and an inference component. The access privileges supported are: read, write and indirect read. An indirect read operation typically allows a user qualified access to one or more portions of a database, but not the entire database.

REFERENCES:
patent: 6061684 (2000-05-01), Glasser et al.
patent: 6484261 (2002-11-01), Wiegel
patent: 6820082 (2004-11-01), Cook et al.
patent: 2002/0144142 (2002-10-01), Shohat
patent: 2002/0178271 (2002-11-01), Graham et al.
patent: 2003/0037263 (2003-02-01), Kamat et al.
patent: 2003/0115484 (2003-06-01), Moriconi et al.
patent: 2004/0019809 (2004-01-01), Sheinis et al.
Giuri et al., “Role templates for content-based access control”, Proceedings of the second ACM workshop on Role-based access control, Fairfax, Virginia, United States pp. 153-159, Year of Publication: 1997.
Agrawal Rakesh and Srikant Ramakrishnan, Fast Algorithms for Mining Association Rules, Proceedings of the 20thInternational Conference on Very Large Arrays, 1994.
Edjlali Guy, Acharya Anurag and Chaudhary Vipin, History-based Access Control for Mobile Code, ACM Conference on Computers and Communications Security 1998, Nov. 5-8, 1998.
Pang Kenneth K, Fine-Grained Event-Based Access Control, Lotus Research Technical Report #98.05, 1998, Lotus Development Coprporation, 55 Cambridge Parkway, Cambridge, MA 02142.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Event-based database access execution does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Event-based database access execution, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Event-based database access execution will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3679760

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.