Information security – Access control or authentication – Network
Reexamination Certificate
2008-09-30
2008-09-30
Parthasarathy, Pramila (Department: 2136)
Information security
Access control or authentication
Network
C726S012000, C726S014000
Reexamination Certificate
active
10729823
ABSTRACT:
A programming interface includes a first group of functions related to communicating a new security policy to multiple security engines. Each of the multiple security engines is configured to replace an existing security policy with the new security policy. The programming interface also includes a second group of functions related to communicating an indication of each security engine's readiness to implement the new security policy.
REFERENCES:
patent: 4104721 (1978-08-01), Markstein et al.
patent: 4970504 (1990-11-01), Chen
patent: 6006328 (1999-12-01), Drake
patent: 6119236 (2000-09-01), Shipley
patent: 6158010 (2000-12-01), Moriconi et al.
patent: 6173404 (2001-01-01), Colburn et al.
patent: 6178173 (2001-01-01), Mundwiler et al.
patent: 6301668 (2001-10-01), Gleichauf et al.
patent: 6408391 (2002-06-01), Huff et al.
patent: 6513721 (2003-02-01), Salmre et al.
patent: 6530024 (2003-03-01), Proctor
patent: 6606710 (2003-08-01), Krishnan et al.
patent: 6684244 (2004-01-01), Goldman et al.
patent: 6789202 (2004-09-01), Ko et al.
patent: 6910135 (2005-06-01), Grainger
patent: 7000247 (2006-02-01), Banzhof
patent: 7010807 (2006-03-01), Yanovsky
patent: 7093292 (2006-08-01), Pantuso
patent: 2003/0065942 (2003-04-01), Lineman et al.
patent: 2003/0204632 (2003-10-01), Willebeek-LeMair et al.
patent: 2003/0236994 (2003-12-01), Cedar et al.
patent: 2004/0003266 (2004-01-01), Moshir et al.
patent: 2004/0015719 (2004-01-01), Lee et al.
patent: 2004/0064731 (2004-04-01), Nguyen et al.
patent: 2004/0139004 (2004-07-01), Cohen et al.
patent: 2004/0260945 (2004-12-01), Raikar et al.
patent: 2005/0044418 (2005-02-01), Miliefsky
patent: 2005/0125694 (2005-06-01), Fakes et al.
patent: 2005/0262362 (2005-11-01), Patrick et al.
Balasubramaniyan, et al., “An Architecture for Intrusion Detection using Autonomous Agents,” 14th IEEE Computer Security Applications Conference, Dec. 1998, 12 pages.
Caldwell, “The Importance of Event Correlation for Effective Security Management,” Information Systems Control Journal, vol. 6, 2002, pp. 36-38.
Krugel, et al., “Decentralized Event Correlation for Intrusion Detection,” ICICS 2001, vol. 2288, Dec. 6-7, 2001, pp. 114-131.
Montesi, “A Transaction Transformation Approach to Active Rule Processing,” Proceedings of the Eleventh International Conference on Data Engineering, 1995, pp. 109-116.
Montesi, “Analysis and Optimization of Active Databases,” Data & Knowledge Engineering, vol. 40, No. 3, Mar. 2002, pp. 241-271.
Park, et al., “Mini-Savepoints: Firewall for Atomic Updates,” Database Systems for Advanced Applications '97, Proceedings of the Fifth International Conference, Apr. 1-4, 1997, pp. 293-302.
“Database Two Phase Commit Software Technology Review”, retrieved on Sep. 30, 2007, at <<http://web.archive.org/web/20020219183616/www.sei.smu.edu/str/descriptions/dtpc—body.html>>, Camegie Mellon University, 2001, pp. 5.
Date, “An Introduction to Database Systems”, Addison Wesley Longman Inc., 2000, pp. 5.
Dubie, “LANDesk Punches up Patch Managment Suite”, at <<http://www.networkworld
ews/2003/0707patch.html>>, Network World, Jul. 2003, pp. 2.
Ulfelder, “Practical Patch Management”, at <<http://www.networkworld.com/supp/security2/patch.html>>, Network World, Oct. 2002, pp. 8.
Fakes Thomas
Townsend Steven
LandOfFree
Security-related programming interface does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Security-related programming interface, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security-related programming interface will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3934096