Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate
2008-03-25
2008-03-25
Vu, Kim (Department: 2135)
Information security
Prevention of unauthorized use of data including prevention...
Access control
C726S001000, C726S004000, C726S017000, C726S021000, C726S028000, C726S029000, C726S030000, C713S164000, C713S165000, C713S166000, C713S167000, C707S793000
Reexamination Certificate
active
07350237
ABSTRACT:
Techniques are described for automating the generation of access control information that identifies users that are permitted to access particular business objects used by a computer application. The generation of access control information is based on a characteristic that is shared by the user and the business object to be accessed. The characteristic may be an attribute. The characteristic also may be the identification of a process to determine a characteristic of a user and/or a characteristic of a business object.
REFERENCES:
patent: 5539906 (1996-07-01), Abraham et al.
patent: 5941947 (1999-08-01), Brown et al.
patent: 6023765 (2000-02-01), Kuhn
patent: 6088679 (2000-07-01), Barkley
patent: 6212511 (2001-04-01), Fisher et al.
patent: 6275825 (2001-08-01), Kobayashi et al.
patent: 6279111 (2001-08-01), Jensenworth et al.
patent: 6470339 (2002-10-01), Karp et al.
patent: 6470353 (2002-10-01), Yaung et al.
patent: 6484258 (2002-11-01), Haverty
patent: 6513039 (2003-01-01), Kraenzel
patent: 6535879 (2003-03-01), Behera
patent: 6539380 (2003-03-01), Moran
patent: 6578037 (2003-06-01), Wong et al.
patent: 6591244 (2003-07-01), Jim et al.
patent: 6591265 (2003-07-01), Erickson et al.
patent: 7167918 (2007-01-01), Byrne et al.
patent: 2002/0026592 (2002-02-01), Gavrila et al.
patent: 2002/0178119 (2002-11-01), Griffin et al.
patent: 2002/0184535 (2002-12-01), Laracuente et al
patent: 0 697 662 (1996-02-01), None
patent: 0913966 (1999-05-01), None
patent: 0 992 873 (2000-04-01), None
patent: 0992873 (2000-04-01), None
“XACML: A New Standard Protects Content in Data Exchange,” Jun. 24, 2003, 7 pages, reprinted from http://developer.java.sun.com/developer/technicalArticles/Security/xacml/xacml.html.
“Sun's XACML Implementation,” Jun. 23, 2003 Update, 2 pages, reprinted from http://sunxacml.sourceforge.net.
“Oasis: XACML Implementers Guide,” Hal Lockhart, ed., Jun. 12, 2002, 5 pages.
“Oasis: Web-Services Policy Language Use-Cases and Requirements, Working Draft 04,” Tim Moses, ed., Apr. 16, 2003, 23 pages.
“Oasis: eXtensible Access Control Markup Language (XACML) Version 1.0, Oasis Standard,” Simon Godik and Tim Moses, eds., Feb. 18, 2003, 132 pages.
Sandhu et al., “Access Control: Principles and Practice, ”IEEE Communications Magazine, Sep. 1994, vol. 32, No. 9, 9 pages.
Barkley, et al. “Managing Role/Permission Relationships Using Object Access Types,” Proceedings of the 3rd ACM Workshop on Role-Based Access Control, New York, US, Oct. 22-23, 1998, pp. 73-80.
Deng, et al., “A Dynamic Access Control Model for Object-Oriented System,” Institute of Electrical and Electronics Engineers, New York, US, Oct. 13-15, 1993, pp. 159-163.
Schaad, et al. “The Role-Based Access Control System of a European Bank: A Case Study and Discussion,” Proceedings of The 6th ACM Symposium on Access Control Models and Technologies, Chantilly, VA, May 3-4, 2001, pp. 3-9.
Drittler Bernhard
Kupke Markus
Vogel Matthias
Dada Beemnet W
Fish & Richardson P.C.
SAP (AG)
Vu Kim
LandOfFree
Managing access control information does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Managing access control information, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Managing access control information will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2785898