Information security – Policy
Reexamination Certificate
2007-02-27
2007-02-27
Song, Hosuk (Department: 2135)
Information security
Policy
C726S002000, C726S003000, C726S027000, C726S030000
Reexamination Certificate
active
10144668
ABSTRACT:
A method and system for implementing access control in a computer system is disclosed. Synonyms associated with shareable security policies and policy functions are employed to encapsulate data from underlying data sources. By controlling access and contents of synonyms and their underlying security policies, fine-grained access control can be implemented for system data sources.
REFERENCES:
patent: 6718535 (2004-04-01), Underwood
patent: 6766314 (2004-07-01), Burnett
patent: 6820082 (2004-11-01), Cook et al.
patent: 6907546 (2005-06-01), Haswell et al.
Bertino, E. et al. “Controlled Access and Dissemination of XML Documents”Proceedings of the 2ndInternational Workshop on Web Information and Date Management, Kansas City, MO (Nov. 1999) pp. 22-27.
Bertino, E. et al. “On Specifying Security Policies for Web Documents with an XML-based Language”Proceedings of the 6thACM Symposium on Access Control Models and Technologies, Chantilly, VA (May 3-4, 2001) pp. 57-65.
Bonczek, R.H. et al. “A Transformational Grammar-Based Query Processor for Access Control in a Planning System”ACM Transactions on Database Systems(Dec. 1977) 2(4):326-338.
Castano, S. et al., “A New Approach to Security System Development”Proceedings of the 1994 Workshop on New Security Paradigms(Aug. 1994) pp. 82-88.
Gladney, H.M. “Access Control for Large Collections”ACM Transactions on Information Systems(Apr. 1977) 15(2):154-194.
Hsiao, D.K. “A Software Engineering Experience in the Management, Design and Implementation of a Data Secure System”Proceedings of the 2ndInternational Conference on Software Engineering(Oct. 1976) pp. 532-538.
Myers, A.C. and B. Liskov “Protecting Privacy Using the Decentralized Label Model”ACM Transactions on Software Engineering and Methodology(Oct. 2000) 9(4):410-442.
Sandhu, R.S. “The Schematic Protection Model: Its Definition and Analysis for Acyclic Attenuating Schemes”Journal of the Association for Computing Machinery(Apr. 1988) 35(2):404-432.
Sion, R. et al. “Rights Protection for Relational Data”Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, San Diego, CA (Jun 9-12, 2003) pp. 98-109.
Wedde, H.F. and M. Lischka “Role-Based Access Control in Ambient and Remote Space”Proceedings of the 9thACM Symposium on Access Control Models and Technologies, Yorktown Heights, NY (Jun. 2-4, 2004) pp. 21-30.
Alomari Ahmed
Lei Chon Hei
Wong Daniel Man-Hung
Bingham & McCutchen LLP
Oracle International Corporation
Song Hosuk
LandOfFree
Method and mechanism for implementing synonym-based access... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and mechanism for implementing synonym-based access..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and mechanism for implementing synonym-based access... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3887205