Method for delegating access rights through executable access co

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

395186, 39520003, 395490, 395491, 395684, G06F 1300

Patent

active

056490992

ABSTRACT:
A method in which access control programs (ACPs) permit controlled delegation of access rights from clients to untrusted intermediaries. ACPs are programs that encode arbitrary specifications of delegated access rights. In the method, a client creates an ACP and associates it with a request to a server, the request being made through one or more intermediaries. When processing a request received from an intermediary, the server executes the access control program to determine whether or not to grant the request.

REFERENCES:
patent: 5210795 (1993-05-01), Lipner et al.
Eichin and Rochlis, "With Microscope and Tweezers: An Analysis of the Internet Virus of Nov. 1988", 1989, pp. 326-343.
J. E. Donnelley et al. "Resource Access Control in a Network Operating System," Univ. of CA, Lawrence Livermore Lab. pp. 115-125.
R. M. Needham et al. "Using Encryption for Authentication in Large Networks of Computers," Communications of the ACM, Dec. 1978, vol. 21, No. 12 pp. 993-999.
D. E. R. Denning "Cryptography and Data Security," (excerpts) '82, pp. 7-16, 56-58, 101-126, 129-133, 161-179, 187-190, 191-329.
Russel Sandberg et al. "Design and Implementation of the Sun Network Filesystem," USENIX Association Summer Conference Proc. Portland, 1985, Jun. 11-14,1985, pp. 119-130.
A. S. Tanenbaum "Using Sparse Capabilities in a Distributed Operating System," The 6th Intl. Conf. on Distributed Computing Systems, Cambridge, Mass., May 19-23, 1986, pp. 558-563.
Richard Stallman "GNU Emacs Manual," Fifth Edition, Emacs Ver. 18, Oct. 1986.
Xerox, "Authentication Protocol," Xerox System Integration Standard, May 1986.
James Gosling "SUNDEW: A Distributed and Extensible Window Sys.," USENIX, '86 Winter USNIX TECH. CONF., Colorado pp. 98-103.
J. G. Steiner "Kerberos: An Authentication Service for Open Network Syst." USENIX Winter Conf. Feb. 9-12, '88, TX, pp. 191-202.
B.N. Bershad "Watchdogs: Extending the UNIX File System," USENIX Winter Conference Feb. 9-12, 1988, Texas pp. 267-275.
J.W. Stamos et al. "Remote Evaluation," ACM Trans. on Programming Languages and Systems, vol. 12, No. 4, Oct. 1990 pp. 537-565.
K. R. Sollins "Cascaded Authentication," Proceedings 1988 IEEE Symposium on Security and Privacy Apr. 18-21, '88, CA pp. 156-163.
J. H. Howard et al. "Scale and Performance in a Distributed File System," ACM Transactions on Computer Systems, vol. 6, No. 1, Feb. 1988, pp. 51-81.
M. Satyanarayanan "Integrating Security in a Large Distributed System," ACM Transactions on Computer Systems, vol. 7, No. 3, Aug. 1989, pp. 247-280.
Morrie Gasser et al. "An Architecture for Practical Delegation in a Distributed System," CH2884-5/90/0000/0020$01.00 .COPYRGT. 1990 IEEE pp. 20-30.
J. K. Ousterhout "Tel: An Embeddable Command Language," USENIX Association of the Winter 1990 USENIX Conference, Jan. 22-26, 1990, Washington, D.C., USA pp. 133-146.
SunOS.TM. Reference Manual, Sun Microsystems, (excerpts) Comm. Commands, Misc. Ref. Man. Pages, Chapt. 1, 4, 8 and 14.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for delegating access rights through executable access co does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for delegating access rights through executable access co, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for delegating access rights through executable access co will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1498792

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.