Information security – Access control or authentication – Network
Reexamination Certificate
2007-04-17
2007-04-17
Zand, Kambiz (Department: 2134)
Information security
Access control or authentication
Network
C726S006000, C726S027000
Reexamination Certificate
active
10162260
ABSTRACT:
An evidence-based policy manager generates a permission grant set for a code assembly received from a resource location. The policy manager executes in a computer system (e.g., a Web client or server) in combination with the verification module and class loader of the run-time environment. The permission grant set generated for a code assembly is applied in the run-time call stack to help the system determine whether a given system operation by the code assembly is authorized. The policy manager may determine a subset of the permission grant set based on a subset of the received code assembly's evidence, in order to expedite processing of the code assembly. When the evidence subset does not yield the desired permission subset, the policy manager may then perform an evaluation of all evidence received.
REFERENCES:
patent: 5644755 (1997-07-01), Wooten
patent: WO 99/30217 (1999-06-01), None
“Decentralized Trust Management”, by M. Blaze, J. Feigenbaum, J. Lacy, in Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 164-173. Also available as a DIMACS Technical Report. This paper describes PolicyMaker. Available in Postscript at http://www.research.att.com/˜jf/pubs/oakland96proc.ps.
“Proceedings of the Sixth International World Wide Web Conference”, Santa Clara, CA, Apr. 1997, by Y. Chu, J. Feigenbaum, B. LaMacchia, P. Resnick, M.. Strauss, REFEREE: Trust Management for Web Applications. Available from http://www.farcaster.com/papers/www6-referee/index.htm.
“The Role of Trust Management in Distributed System Security”, M. Blaze, J. Feigenbaum, J. Ionnidis, A. Keromytis, Secure Internet Programming: Security Issues for Distributed and Mobile Objects, Lecture Notes in Computer Science, vol. 1603, Springer, Berlin, 1999, pp. 185-210. Postscript available from http://www.research.att.com/˜jf/pubs/sip99.ps.
“Managing Trust in an Information-Labeling System”, European Transactions on Telecommunications, 8 (1997), pp. 491-501. (Special issue of selected papers from the 1996 Amalfi Conference on Secure Communication in Networks.) Postscript from http://www.research.att.com/˜jf/pubs/ett97.ps.
“The Evolution of Java Security”, by Koved, Nadalin, Neal and Lawson, including information on Java-based systems, IBM.
Information on KeyNote including: “The KeyNote Trust-Management System” from RFC 2704, at http://www.cis.upenn.edu/˜angelos/keynote.html; and “Using the KeyNote Trust Management System” by Matt Blaze, at http://www.crypto.com/trustmgt/.
“Trust management on the World Wide Web”, by Khare and Rifkin, at http://www7.scu.edu.au/programme/posters/1902/com1902.htm.
“Compliance Checking in the PolicyMaker Trust Management System”, by Blaze, Fiegenbaum and Strauss, AT&T Labs-Research.
“Program Specialization and Partial Evaluation”, 3 pages printed from http://www.diku.dk/research-groups/tepps/activities/PartialEvaluation.html..
Fee Gregory D.
Kohnfelder Loren
Lange Sebastian
Pratt Brian
Powers William S
Zand Kambiz
LandOfFree
Partial grant set evaluation from partial evidence in an... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Partial grant set evaluation from partial evidence in an..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Partial grant set evaluation from partial evidence in an... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3773836