Method, system and computer program product for enforcing...

Information security – Prevention of unauthorized use of data including prevention... – Access control

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S001000, C726S010000, C726S017000, C726S022000, C726S026000, C713S165000, C713S166000, C713S167000, C713S168000

Reexamination Certificate

active

07877812

ABSTRACT:
A method for enforcing privacy policies associated with data. The method includes accessing a database to identify labeled data in the database, the labeled data associated with a privacy policy. An access node accessing the label data is determined. For the access node accessing the labeled data, it is determined whether the access node applies an authorization test as indicated by the privacy policy. An authorization test is associated with the access node if the access node does not apply necessary authorization indicated by the privacy policy.

REFERENCES:
patent: 6987381 (2006-01-01), Yano
patent: 2004/0221287 (2004-11-01), Walmsley
patent: 2004/0268141 (2004-12-01), Zimmer et al.
patent: 2005/0044409 (2005-02-01), Betz et al.
patent: 2005/0257244 (2005-11-01), Joly et al.
patent: 2006/0026667 (2006-02-01), Bhide et al.
patent: 2006/0048224 (2006-03-01), Duncan et al.
patent: 2006/0048226 (2006-03-01), Rits et al.
patent: 2006/0059539 (2006-03-01), Shashikumar et al.
patent: 2007/0016937 (2007-01-01), Bassett et al.
patent: 2007/0226807 (2007-09-01), Ginter et al.
International Search Report, PCT/US2008/000008, Nov. 26, 2009.
Larry Koved et al., Access Rights Analysis for Java, OOPSLA, Nov. 4-8, 2002, IBM T.J. Research Center, Seattle, Washington, USA.
Marco Pistoia et al., Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection, IBM Watson Research Center, 2005, Yorktown Heights, NY.
Ulfar Erlingsson et al., IRM Enforcement of Java Stack Inspection, Feb. 19, 2000, Cornell University, Ithaca, NY.
Gleb Naumovich et al., Static Analysis of Role—Based Access Control in J2EE Applications, ACM SIGSOFT Software Engineering Notes, Sep. 2004, vol. 29, Issue 5, ACM Press, New York, NY.
Paolina Centonze et al., Role-Based Access Control Consistency Validation, ISSTA '06: Proceedings of the 2006 International Symposium on software testing and analysis.
Marco Pistoia et al., When Role Models Have Flaws: Static Validation of Enterprise Security Policies, Sep. 19, 2006, IBM Research Division, Yorktown Heights, New York.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method, system and computer program product for enforcing... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method, system and computer program product for enforcing..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method, system and computer program product for enforcing... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2698731

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.