Implementing access control policies across dissimilar...

Information security – Policy

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S027000

Reexamination Certificate

active

08056114

ABSTRACT:
A method of implementing access control requirements to control access to a plurality of system resources. The requirements are modeled as contents of security policies. The security policy contents are integrated into a policy set. Representations of the integrated policy set are generated, each representation corresponding to a target system that controls access to the resources. The policy set representation(s) are integrated with the corresponding target system(s) to implement the policy set. This method makes it possible to implement high-level security requirements correctly and consistently across systems of a system-of-systems (SoS) and/or distributed system.

REFERENCES:
patent: 2958179 (1960-11-01), Wolfe et al.
patent: 6023765 (2000-02-01), Kuhn
patent: 6324647 (2001-11-01), Bowman-Amuah
patent: 6640307 (2003-10-01), Viets et al.
patent: 7178033 (2007-02-01), Garcia
patent: 7340469 (2008-03-01), Alghathbar et al.
patent: 2004/0093518 (2004-05-01), Feng et al.
patent: 2004/0193909 (2004-09-01), Chang et al.
patent: 2005/0166260 (2005-07-01), Betts et al.
patent: 2005/0268325 (2005-12-01), Kuno et al.
patent: 2006/0090131 (2006-04-01), Kumagai
patent: WO 01/33349 (2001-05-01), None
patent: WO 02/101975 (2002-12-01), None
patent: WO2005/009003 (2005-01-01), None
patent: WO 2005/009003 (2005-01-01), None
patent: WO 2005/009003 (2005-01-01), None
Indrakshi, Ray, “Using UML to Visualize Role-Based Access Control Constraints,” SACMAT 04', Jun. 2-4, 2004, Copyright 2004.
Indraski, Ray, Using UML to Visualize Role-Based Access Control Constraints, PUblished Jun. 2-4, 2004, Copyright, 2004.
“Using UML to Visualize Role Based Access Control Contraints,” Indrakshi, Ray, SACMAT'04, Jun. 2-4, 2004, Yorktown, Heights, New York, USA.
Adda et al., MceTech, Jan. 19, 2005.
Hannover et al., Rule-based Policy Specification: State of the Art and Future Work, 2004.
Damianou et al., A Survey of Policy Specification Approaches, Apr. 2002.
XACML, Aug. 23, 2005.
Hassan, Process based governance using Policies.
Unified Modeling Language, Aug. 23, 2005.
Ray et al., Using UML to Visualize Role-Based Access Control Constraints, 2004.
IBM Rational Software Modeler, Oct. 2004.
Ferraiolo et al., Role Based Access Control, Aug. 23, 2005.
White Papers and Business Guides, Aug. 23, 2005.
Acevedo et al., Enterprise Security Applications of Partition Rule Based Access Control (PRBAC), Aug. 23, 2005.
Manish Verma, XML Security: Control information access with XACML, Aug. 23, 2005.
Johnson, M. et al., KAoS Semantic Policy and Domain Services: An Application of DAML to Web Services-Based Grid Architectures; Proceedings of the AAMAS 03 Workshop on Web Services and Agent-Based Engineering; Melbourne, Australia; 2003.
Suri, N., et al., DAML-based Policy Enforcement for Semantic Data Transformation and Filtering in Multi-agent Systems; Proceedings of the Autonomous Agents and Multi-Agent Systems Conference (AAMAS 2003); Melbourne, Australia; New York, NY: ACM Press; 2003.
Tonti, G., et al., Semantic Web Languages for Policy Representation and Reasoning: A Comparison of KAoS, Rei, and Ponder; Submitted to the International Semantic Web Conference (ISWC 03); Sanibel Island, Florida; 2003.
Uszok, A., et al., KAoS Policy and Domain Services: Toward a Description-Logic Approach to Policy Representation, Deconfliction, and Enforcement; Proceedings of Policy 2003; Como, Italy, in press; 2003.
Uszok, A., et al., DAML Reality Check: A Case Study of KAoS Domain and Policy Services; Submitted to the International Semantic Web Conference (ISWC 03); Sanibel Island, Florida; 2003.
Article on Mixed Radix; http://en.wikipedia.org/wiki/Mixed—radix; Feb. 10, 2009.
Vainstein, F., et al., Reduction in Space Complexity and Error Detection/Correction of a Fuzzy Controller; 2006.
Richardson, A., et al.; Variable-Radix Integrated Counter; Electronic Letters, Dec. 1966, vol. 2, issue No. 12; pp. 448-449.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Implementing access control policies across dissimilar... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Implementing access control policies across dissimilar..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Implementing access control policies across dissimilar... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4262707

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.