Fuzzy multi-level security

Information security – Prevention of unauthorized use of data including prevention... – Access control

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S022000, C726S026000

Reexamination Certificate

active

08087090

ABSTRACT:
An access control system and method includes a risk index module which computes a risk index for a dimension contributing to risk. A boundary range defined for a parameter representing each risk index such that the parameter above the range is unacceptable, below the range is acceptable and in the range is acceptable with mitigation measures. A mitigation module determines the mitigation measures which reduce the parameter within the range by mapping the effectiveness of performing the mitigation measures to determine a residual risk after a mitigation measure has been implemented.

REFERENCES:
patent: 6430561 (2002-08-01), Austel et al.
patent: 7197427 (2007-03-01), Noonan et al.
patent: 2003/0101348 (2003-05-01), Russo et al.
J.-S.R. Jang, “Fuzzy Sets”, Chapter 2; 1997; pp. 13-17 and 28.
S. N. Chari et al, “BlueBox: A Policy-Driven, Host-based Intrusion Detection System”, ACM Transactions on Information and System Security, vol. 6. No. 2, May 2003, pp. 173-200.
David E. Bell et al., “Computer Security Model: Unified Exposition and Multics Interpretation”, Technical Report ESD-TR-75-306, The Mitre Corp, Bedford, MD Jun. 1975, pp. 1-134.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Fuzzy multi-level security does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Fuzzy multi-level security, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Fuzzy multi-level security will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4299591

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.