Method and system for using a rules engine for enforcing...

Information security – Prevention of unauthorized use of data including prevention... – Access control

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S022000, C726S024000, C726S026000, C726S027000, C713S151000, C706S047000, C718S102000

Reexamination Certificate

active

07984513

ABSTRACT:
Computer system and method enforces control policies including access and usage policies. A rules-based engine member or assembly is coupled between a rights-management (or similar) system and one or more target applications. The rules-based engine member centralizes data security determinations for the target applications. One or more agents are responsive to the rules-based engine member and target applications, and handle low-level details in interactions between the rules-based engine member and target applications. A generic engine framework serves as a normalizing factor and enables scalability.

REFERENCES:
patent: 5278901 (1994-01-01), Shieh et al.
patent: 6476833 (2002-11-01), Moshfeghi
patent: 6775780 (2004-08-01), Muttik
patent: 7607131 (2009-10-01), Oe et al.
patent: 2002/0099952 (2002-07-01), Lambert et al.
patent: 2003/0191730 (2003-10-01), Adkins et al.
patent: 2003/0212902 (2003-11-01), van der Made
patent: 2004/0054894 (2004-03-01), Lambert
patent: 2004/0138936 (2004-07-01), Johnson et al.
patent: 2005/0108518 (2005-05-01), Pandya
patent: 2008/0271163 (2008-10-01), Stillerman et al.
Erlingsson, U. and F.B. Schneider, “SASI Enforcement of Security Policies: A Retrospective,”Proceedings of the 1999 Workshop on New Security Paradigms, pp. 87-95 (1999).
Ilgun, K. and R.A. Kemmerer, “State Transition Analysis: A Rule-Based Intrusion Detection Approach,”IEEE Transactions on Software Engineering21(3):181-199 (1995).
Lindqvist, U. and P.A. Porras, Detecting Computer and Network Misuse Through the Production-Based Expert System Toolset (P-BEST),Proceedings of the 1999 IEEE Symposium on Security and Privacy, pp. 146-161 (1999).
Schneider, F.B., “Enforceable Security Policies,”ACM Transactions on Information and System Security3(1):30-50 (2000).
Tsudik, G. and R. Summers, “AudES—an Expert System for Security Auditing,”Proceedings of the AAAI Conference on Innovative Applications in Artificial Intelligence, pp. 221-232 (1990).
Giarratano, J.C. and G.D. Riley,Expert Systems Principles and Programming, Thomson Course Technology, 4th Edition (2005), description downloaded from http:hed.thomsonlearning.co.uk/controls/printable/aspx?isbn=0534384471.
Krause, M. and H.F. Tipton,Handbook of Information Security Management, Auerbach Publications, (1998), description downloaded from http://btobsearch.barnesandnoble.com/booksearch/isbninquiry.asp?z=y&btob=Y&ean=9780849399473& . . . .

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for using a rules engine for enforcing... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for using a rules engine for enforcing..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for using a rules engine for enforcing... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2653005

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.