Information security – Access control or authentication – Network
Reexamination Certificate
2008-04-04
2011-10-18
Shiferaw, Eleni (Department: 2437)
Information security
Access control or authentication
Network
C726S001000, C726S028000, C705S051000, C713S185000
Reexamination Certificate
active
08042158
ABSTRACT:
A method of determining unauthorized user access requests in a data processing system, the method comprising the steps of accessing a record of role managed authorizations and a record of manually assigned authorizations, receiving a record of user authorization requests from a plurality of data processing systems, and comparing the record of user authorization requests to the record of role managed authorizations and to the record of manually assigned authorizations to identify any unauthorized authorizations.
REFERENCES:
patent: 6237036 (2001-05-01), Ueno et al.
patent: 6871232 (2005-03-01), Curie et al.
patent: 2003/0088786 (2003-05-01), Moran et al.
patent: 2003/0135755 (2003-07-01), Hahn
patent: 2003/0187846 (2003-10-01), Bangel et al.
patent: 2005/0138420 (2005-06-01), Sampathkumar et al.
patent: 2005/0289234 (2005-12-01), Dai et al.
patent: 2006/0089932 (2006-04-01), Buehler et al.
patent: 0547990 (1992-11-01), None
patent: 1768048 (2006-09-01), None
patent: 2430283 (2006-09-01), None
patent: WO 0000896 (1999-05-01), None
Thomas, Roshan K. (Odyssey Research Associates), “Team-based Access Control (TMAC): A primitive for Applying Role-based Access Controls in Collaborative Environments”, Proceedings of the ACM Workshop on Role-Based Access Control, 1997, pp. 13-19.
“Identity and Access Management”, Oct. 26, 2004, Avaya Inc. and Earnst & Young LLP http://conference.digitalidworld.com/2004/attendees/slides/1026—1700—F.pdf.
Forster, Jacques (Solution Architect, OPNS), “Role Based Access Control Privilege Management the Pragmatic Way”, Open Forum 2006, http:/www.opns.be/pdf/RoleBasedAccessControl.pdf.
Cheng, Edward C., “An Object-Oriented Organizational Model to Support Dynamic Role-based Access Control in Electronic Commerce Applications”, Proceedings of the 32nd Hawaii International Conference on System Sciences—1999, http:csd12.computer.org/comp/proceedings/hicss/1999/0001/08/00019022.PDF.
Shin, Dongwan et al., “A Role-Based Infrastructure Management System: Design and Implementation”, Concurrency and Computation: Practice and Experience, v 16, n 11, Sep. 2004, Computer Security, pp. 1121-1141.
Callahan Paul
International Business Machines - Corporation
Law Offices of Ira D. Blecker, P.C.
Shiferaw Eleni
LandOfFree
Management of user authorizations does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Management of user authorizations, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Management of user authorizations will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4279922