Method and mechanism for implementing synonym-based access...

Information security – Policy

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S002000, C726S003000, C726S027000, C726S030000

Reexamination Certificate

active

10144668

ABSTRACT:
A method and system for implementing access control in a computer system is disclosed. Synonyms associated with shareable security policies and policy functions are employed to encapsulate data from underlying data sources. By controlling access and contents of synonyms and their underlying security policies, fine-grained access control can be implemented for system data sources.

REFERENCES:
patent: 6718535 (2004-04-01), Underwood
patent: 6766314 (2004-07-01), Burnett
patent: 6820082 (2004-11-01), Cook et al.
patent: 6907546 (2005-06-01), Haswell et al.
Bertino, E. et al. “Controlled Access and Dissemination of XML Documents”Proceedings of the 2ndInternational Workshop on Web Information and Date Management, Kansas City, MO (Nov. 1999) pp. 22-27.
Bertino, E. et al. “On Specifying Security Policies for Web Documents with an XML-based Language”Proceedings of the 6thACM Symposium on Access Control Models and Technologies, Chantilly, VA (May 3-4, 2001) pp. 57-65.
Bonczek, R.H. et al. “A Transformational Grammar-Based Query Processor for Access Control in a Planning System”ACM Transactions on Database Systems(Dec. 1977) 2(4):326-338.
Castano, S. et al., “A New Approach to Security System Development”Proceedings of the 1994 Workshop on New Security Paradigms(Aug. 1994) pp. 82-88.
Gladney, H.M. “Access Control for Large Collections”ACM Transactions on Information Systems(Apr. 1977) 15(2):154-194.
Hsiao, D.K. “A Software Engineering Experience in the Management, Design and Implementation of a Data Secure System”Proceedings of the 2ndInternational Conference on Software Engineering(Oct. 1976) pp. 532-538.
Myers, A.C. and B. Liskov “Protecting Privacy Using the Decentralized Label Model”ACM Transactions on Software Engineering and Methodology(Oct. 2000) 9(4):410-442.
Sandhu, R.S. “The Schematic Protection Model: Its Definition and Analysis for Acyclic Attenuating Schemes”Journal of the Association for Computing Machinery(Apr. 1988) 35(2):404-432.
Sion, R. et al. “Rights Protection for Relational Data”Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, San Diego, CA (Jun 9-12, 2003) pp. 98-109.
Wedde, H.F. and M. Lischka “Role-Based Access Control in Ambient and Remote Space”Proceedings of the 9thACM Symposium on Access Control Models and Technologies, Yorktown Heights, NY (Jun. 2-4, 2004) pp. 21-30.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and mechanism for implementing synonym-based access... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and mechanism for implementing synonym-based access..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and mechanism for implementing synonym-based access... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3887205

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.