Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate
2011-01-25
2011-01-25
Zand, Kambiz (Department: 2434)
Information security
Prevention of unauthorized use of data including prevention...
Access control
C726S001000, C726S010000, C726S017000, C726S022000, C726S026000, C713S165000, C713S166000, C713S167000, C713S168000
Reexamination Certificate
active
07877812
ABSTRACT:
A method for enforcing privacy policies associated with data. The method includes accessing a database to identify labeled data in the database, the labeled data associated with a privacy policy. An access node accessing the label data is determined. For the access node accessing the labeled data, it is determined whether the access node applies an authorization test as indicated by the privacy policy. An authorization test is associated with the access node if the access node does not apply necessary authorization indicated by the privacy policy.
REFERENCES:
patent: 6987381 (2006-01-01), Yano
patent: 2004/0221287 (2004-11-01), Walmsley
patent: 2004/0268141 (2004-12-01), Zimmer et al.
patent: 2005/0044409 (2005-02-01), Betz et al.
patent: 2005/0257244 (2005-11-01), Joly et al.
patent: 2006/0026667 (2006-02-01), Bhide et al.
patent: 2006/0048224 (2006-03-01), Duncan et al.
patent: 2006/0048226 (2006-03-01), Rits et al.
patent: 2006/0059539 (2006-03-01), Shashikumar et al.
patent: 2007/0016937 (2007-01-01), Bassett et al.
patent: 2007/0226807 (2007-09-01), Ginter et al.
International Search Report, PCT/US2008/000008, Nov. 26, 2009.
Larry Koved et al., Access Rights Analysis for Java, OOPSLA, Nov. 4-8, 2002, IBM T.J. Research Center, Seattle, Washington, USA.
Marco Pistoia et al., Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection, IBM Watson Research Center, 2005, Yorktown Heights, NY.
Ulfar Erlingsson et al., IRM Enforcement of Java Stack Inspection, Feb. 19, 2000, Cornell University, Ithaca, NY.
Gleb Naumovich et al., Static Analysis of Role—Based Access Control in J2EE Applications, ACM SIGSOFT Software Engineering Notes, Sep. 2004, vol. 29, Issue 5, ACM Press, New York, NY.
Paolina Centonze et al., Role-Based Access Control Consistency Validation, ISSTA '06: Proceedings of the 2006 International Symposium on software testing and analysis.
Marco Pistoia et al., When Role Models Have Flaws: Static Validation of Enterprise Security Policies, Sep. 19, 2006, IBM Research Division, Yorktown Heights, New York.
Koved Lawrence
Pistoia Marco
Cantor & Colburn LLP
International Business Machines - Corporation
Tran Tongoc
Young Preston
Zand Kambiz
LandOfFree
Method, system and computer program product for enforcing... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method, system and computer program product for enforcing..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method, system and computer program product for enforcing... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2698731