Electrical computers and digital processing systems: multicomput – Computer-to-computer session/connection establishing
Reexamination Certificate
2006-06-13
2006-06-13
Dharia, Rupal (Department: 2141)
Electrical computers and digital processing systems: multicomput
Computer-to-computer session/connection establishing
C709S229000, C709S228000, C713S167000
Reexamination Certificate
active
07062563
ABSTRACT:
A method and system for managing access information for users and other entities in a distributed computing system is disclosed. An aspect of the invention relates to current user links between a first computing node and a second computing node. Objects are created/maintained to identify allowable links between computing nodes. Objects can also be created/maintained to store identification of chains of links. The current user link allows access for a user from the first computing node to the second computing node without user authentication by the second computing node. This can be implemented using trust relationships between the first and second computing nodes. Transitive aspects of the trust relationships can be handled by accessing information about chains of users
odes. In addition, trust relationships can be administered by a local computing node.
REFERENCES:
patent: 5450581 (1995-09-01), Bergen et al.
patent: 5684951 (1997-11-01), Goldman et al.
patent: 5708812 (1998-01-01), Van Dyke et al.
patent: 5768519 (1998-06-01), Swift et al.
patent: 5884316 (1999-03-01), Bernstein et al.
patent: 5899987 (1999-05-01), Yarom
patent: 6119230 (2000-09-01), Carter
patent: 6145086 (2000-11-01), Bellemore et al.
patent: 6158010 (2000-12-01), Moriconi et al.
patent: 6178511 (2001-01-01), Cohen et al.
patent: 6192130 (2001-02-01), Otway
patent: 6240512 (2001-05-01), Fang et al.
patent: 6243816 (2001-06-01), Fang et al.
patent: 6253216 (2001-06-01), Sutcliffe et al.
patent: 6275944 (2001-08-01), Kao et al.
patent: 6289462 (2001-09-01), McNabb et al.
patent: 6321259 (2001-11-01), Ouellette et al.
patent: 6339423 (2002-01-01), Sampson et al.
patent: 6377950 (2002-04-01), Peters et al.
patent: 6385724 (2002-05-01), Beckman et al.
patent: 6490591 (2002-12-01), Denbar et al.
patent: 8507817 (2003-01-01), Wolfe et al.
patent: 6535879 (2003-03-01), Behera
patent: 6556995 (2003-04-01), Child et al.
patent: 6651168 (2003-11-01), Kao et al.
patent: 6678682 (2004-01-01), Jenkins et al.
patent: 6768988 (2004-07-01), Boreham et al.
patent: 2002/0007346 (2002-01-01), Qiu et al.
patent: 2002/0026592 (2002-02-01), Gavrila et al.
patent: 2002/0069223 (2002-06-01), Goodisman et al.
patent: 2002/0078004 (2002-06-01), Ambrosini et al.
patent: 2002/0082818 (2002-06-01), Ferguson et al.
patent: 2002/0083073 (2002-06-01), Vaidya et al.
patent: 2003/0195888 (2003-10-01), Croft et al.
Oracle8 Server Concepts, “Privileges and Roles”, Release 8.0, vol. 2, Jun. 1997, pp. 25-1 through 25-15.
Bertino, E. et al. “Controlled Access and Dissemination of XML Documents”Proceedings of the 2ndInternational Workshop on Web Information and Date Management(Nov. 1999) pp. 22-27.
Bertino, E. et al. “On Specifying Security Policies for Web Documents with an XML-Based Language”Proceedings of the 6thACM Symposium on Access Control Models and Technologies(May 2001) pp. 57-65.
Bonczek, R.H. et al. “A Transformational Grammar-Based Query Processor for Access Control in a Planning System”ACM Transactions on Database Systems(TODS) (Dec. 1977) 2(4):326-338.
Castano, S. et al. “A New Approach to Security System Development”Proceedings of the 1994 Workshop on New Security Paradigms(Aug. 1994) pp. 82-88.
Gladney, H.M. “Access Control for Large Collections”ACM Transactions on Information Systems(TOIS) (Apr. 1997) 15(2):154-194.
Hsiao, D.K. “A Software Engineering Experience in the Management, Design and Implementation of a Data Secure System”Proceedings of the 2ndInternational Conference on Software Engineering(Oct. 1976) pp. 532-538.
Myers, A.C. and B. Liskov “Protecting Privacy Using the Decentralized Label Model”ACM Transactions on Software Engineering and Methodology(Oct. 2000) 9(4):410-442.
Sandhu, R.S. “The Schematic Protection Model: Its Definition and Analysis for Acyclic Attenuating Schemes”Journal of the Association of Computing Machinery(JACM) (Apr. 1988) 35(2):404-432.
Sion, R. et al. “Data Security and Protection: Rights Protection for Relational Data”Proceedings of the 2003 ACM SIGMOD International Conference on Management of Date(Jun. 2003) pp. 98-109.
Weede, H.F. and M. Lischka “Role-Based Access Control in Ambient and Remote Space”Proceedings of the 9thACM Symposium on Access Control Models and Technologies(Jun. 2004) pp. 21-30.
Bellemore John
Lewis Nina
Dharia Rupal
Patel Chirag R.
LandOfFree
Method and system for implementing current user links does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for implementing current user links, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for implementing current user links will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3700896