Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Reexamination Certificate
2006-06-13
2006-06-13
Morse, Gregory (Department: 2134)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
C713S100000, C713S001000, C713S182000, C713S183000, C707S793000
Reexamination Certificate
active
07062660
ABSTRACT:
A method and apparatus for controlling the performance of a mount operation changing the logical association of a first file system with a second file system of an information handling system by a user who may not have general authority to perform such a mount operation. In response to a request by a user to perform a requested mount operation on the first file system, a determination is made of whether the user has general authority to perform the requested mount operation, either because the user has general superuser authority or because the user has superuser authority for mount operations. If the user has general authority to perform the requested mount operation, the requested mount operation is performed. If the user does not have general authority to perform the requested mount operation, the requested mount operation is performed only if the user has a predetermined access authority to the first file system.
REFERENCES:
patent: 5001628 (1991-03-01), Johnson et al.
patent: 5838910 (1998-11-01), Domenikos et al.
patent: 5838916 (1998-11-01), Domenikos et al.
patent: 5946685 (1999-08-01), Cramer et al.
patent: 6052785 (2000-04-01), Lin et al.
patent: 6115741 (2000-09-01), Domenikos et al.
patent: 0325777 (1999-08-01), None
patent: 2228599 (1990-08-01), None
patent: 5250249 (1993-09-01), None
patent: 8006839 (1996-01-01), None
Lee, “How to Mount/Unmount for Users,” Linux Gazette, Issue #17, May 1997.
Man et al., “Chapter 4: Filesystem Restrictions,” Linux System Security: The Administrator's Guide to Open Source Secrity Tools, Pearson Educational Publishers, Sep. 18, 2002.
UNIX System Security, D.A. Curry, 1992, pp. 96-97.
The UNIX Operating System, K. Christian, 1988, pp. 49-62 and pp. 344-345.
Modern Operating Systems, A.S. Tannenbaum, 1992, pp. 265-314.
OS/390 UNIX System Services Planning, Mar. 2000, SC28-1890-09.
OS/390 UNIX System Services Command Reference, Mar. 2000, SC28-1892-09.
zOS UNIX System Services Planning, Mar. 2001, GA22-7800-00.
OS/390 UNIX System Services Programming: Assembler Callable Services Reference, Mar. 2000, SA22-7803-00.
z/OS UNIX Systems Services Programming: Assembler Callable Services Reference, Mar. 2001, SA22-7803-00.
z/OS UNIX Systems Services Command Reference, Mar. 2001, SA22-7802-00.
OS/390 Security Server (RACF) General User's Guide, Sep. 1999, SC28-1917-06.
z/OS Secure Way Security Server (RACF) General User's Guide, Mar. 2001, SA22-7685-00.
OS/390 Security Server (RACF) Callable Services, Sep. 1999, GC28-1921-06.
z/OS Secure Way Security Server (RACF) Callable Services, Mar. 2001, SA22-7691-00.
z/OS UNIX System Services; Security Sampler, Jul. 2001; pp. 1-19.
Elmore John
Kinnaman, Jr. William A.
Morse Gregory
LandOfFree
Method and apparatus for controlling the performance of a... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for controlling the performance of a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for controlling the performance of a... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3687423