Role-permission model for security policy administration and...

Electrical computers and digital processing systems: multicomput – Computer-to-computer session/connection establishing – Network resources access controlling

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C707S793000, C713S165000

Reexamination Certificate

active

07124192

ABSTRACT:
Methods, systems, and computer program products are disclosed for protecting the security of resources in distributed computing environments. The disclosed techniques improve administration and enforcement of security policies. Allowed actions on resources, also called permissions, (such as invocations of particular methods, read or write access of a particular row or perhaps a particular column in a database table, and so forth) are grouped, and each group of permissions is associated with a role name. A particular action on a particular resource may be specified in more than one group, and therefore may be associated with more than one role. Each role is administered as a security object. Users and/or user groups may be associated with one or more roles. At run-time, access to a resource is protected by determining whether the invoking user has been associated with (granted) at least one of the roles required for this type of access on this resource.

REFERENCES:
patent: 5911143 (1999-06-01), Deinhart et al.
patent: 6088679 (2000-07-01), Barkley
patent: 6173289 (2001-01-01), Sonderegger et al.
patent: 6202066 (2001-03-01), Barkley et al.
patent: 6434607 (2002-08-01), Haverstock et al.
patent: 2002/0026592 (2002-02-01), Gavrila et al.
patent: 2002/0031230 (2002-03-01), Sweet et al.
patent: 2003/0088786 (2003-05-01), Moran et al.
patent: 2003/0115487 (2003-06-01), Andrews et al.
“Security” Chapter of The JZEE™ Tutoria, By Eric Jendrock, 17 pages.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Role-permission model for security policy administration and... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Role-permission model for security policy administration and..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Role-permission model for security policy administration and... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3665575

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.