Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Patent
1998-03-20
2000-10-24
Etienne, Ario
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
713201, 713202, 709225, 709229, 710200, 710240, G06F 1214
Patent
active
061382388
ABSTRACT:
A system regulates access to resources requested by an operation executing on a computer. The operation invokes a plurality of methods that operate upon code during execution. The system includes a policy file, a call stack, and an execution unit. The policy file stores permissions for each of the resources. The permissions authorize particular types of access to the resource based on a source of the code and an executor of the code. The call stack stores representations of the methods and executors in an order of invocation by the operation. The execution unit grants access to the resource when the types of access authorized by the permissions of all of the methods and executors on the call stack encompass the access requested by the operation.
REFERENCES:
patent: 4809160 (1989-02-01), Mahon et al.
patent: 5088036 (1992-02-01), Ellis et al.
patent: 5187787 (1993-02-01), Skeen et al.
patent: 5257369 (1993-10-01), Skeen et al.
patent: 5293614 (1994-03-01), Ferguson et al.
patent: 5297283 (1994-03-01), Kelly, Jr. et al.
patent: 5311591 (1994-05-01), Fischer
patent: 5557798 (1996-09-01), Skeen et al.
patent: 5560003 (1996-09-01), Nilsen et al.
patent: 5561785 (1996-10-01), Blandy et al.
patent: 5577231 (1996-11-01), Scalzi et al.
patent: 5603031 (1997-02-01), White et al.
patent: 5655148 (1997-08-01), Richman et al.
patent: 5659751 (1997-08-01), Heninger
patent: 5675782 (1997-10-01), Montague et al.
patent: 5720033 (1998-02-01), Deo
patent: 5745678 (1998-04-01), Herzberg et al.
patent: 5754762 (1998-05-01), Kuo et al.
patent: 5765153 (1998-06-01), Benantar et al.
patent: 5809145 (1998-09-01), Slik et al.
patent: 5832228 (1998-11-01), Holden et al.
patent: 5845129 (1998-12-01), Wendorf et al.
patent: 5892904 (1999-04-01), Atkinson et al.
Jaworski, "Java 1.1 Developer's Guide," 2nd Ed., 1997, Sams.net Publishing.
T. Lindholm et al., "The Java Virtual Machine Specification," Addison Wesley, 1996.
R. Jones et al., "Garbage Collection, Algorithms For Automatic Dynamic Memory Management," 1996.
Birrell et al., "Implementing Remote Procedure Calls," ACM Transactions on Computer Systems, vol. 2, No. 1, Feb. 1984, pp. 39-59.
Mullender, Distributed Systems, Second Edition, Addison-Wesley, 1993.
Howard et al., Scale and Performance in a Distributed File System, ACM Transactions on Computer Systems, vol. 6, No. 1, Feb. 1988, pp. 51-81.
Cardelli, Obliq, A lightweight language for network objects, Nov. 5, 1993, pp. 1-37.
Dijkstra, Self-stabilizing Systems in Spite of Distributed Control, Communications of the ACM, vol. 17, No. 11, Nov. 1974, pp. 643-644.
Ousterhout et al., The Sprite Network Operating System, Computer, IEEE, Feb. 1988, pp. 23-36.
Dourish, A Divergence-Based Model of Synchrony and Distribution in Collaborative Systems, Xerox Technical Report EPC-1994-102, 1994, pp. 1-10.
Sharrott et al., ObjectMap: Integrating High Performance Resources into a Distributed Object-oriented Environment, ICODP, 1995.
Birrell et al., Grapevine: An Exercise in Distributed Computing, Communications of the ACM, vol. 25, No. 4, Apr. 1982, pp. 260-274.
Transparent Network Computing, Locus Computing Corporation, Jan. 5, 1995.
Gray et al., Leases: An Efficient Fault-Tolerant Mechanism for Distributed File Cache Consistency, ACM, 1989, pp. 202-210.
Lamport et al., The Byzantine Generals Problem, ACM Transactions on Programming Languages and Systems, vol. 4, No. 3, Jul. 1982, pp. 382-401.
Dolev et al., On the Minimal Synchronism Needed for Distributed Consensus, Journal of the ACM, vol. 34, No. 1, Jan. 1987, pp. 77-97.
Mummert et al., Long Term Distributed File Reference Tracing: Implementation and Experience, Carnegie Mellon University School of Computer Science, Nov. 1994, pp. 1-28.
Gelernter et al., Parallel Programming in Linda, Yale University, Jan. 1985, pp. 1-21.
Cannon et al., Adding Fault-Tolerant Transaction Processing to Linda, Software-Practice and Experience, vol. 24(5), May 1994, pp. 449-466.
Kambhatla et al., Recovery with Limited Replay: Fault-Tolerant Processes in Linda, Oregon Graduate Institute, Technical Report CS/E 90-019, Sep. 1990, pp. 1-16.
Anderson et al., Persistent Linda: Linda + Transactions + Query Processing, Proceedings of the 13th Symposium on Fault Tolerant Systems, 1994, pp. 93-109.
Gelernter, Generative Communication in Linda, ACM Transactions on Programming Languages and Systems, vol. 7, No. 1, Jan. 1985, pp. 80-112.
Carriero et al., Distributed Data Structures in Linda, Principals of Programming Language, 1986, pp. 1-16.
Pinakis, Using Linda as the Basis of an Operating System Microkernel, University of Western Australia, Department of Computer Science, Aug. 1993, pp. 1-165.
Linda Database Search, Jul. 20, 1995, p. 1-68.
Carriero et al, Distributed Data Structures in Linda, Yale Research Report YALEU/DCS/RR-438, Nov. 1985, pp. 1-16.
Agha et al., Actorspaces: An Open Distributed Programming Paradigm, University of Illinois, Report No. UIUCDcS-R-92-1766, Open Systems Laboratory TR No. 8, Nov. 1992, pp. 1-12.
Ahmed et al., A Program Building Tool for Parallel Applications, Yale University, Dec. 1, 1993, pp. 1-23.
Liskov et al., Distributed Object Management in Thor, International Workshop on Distributed Object Management, 1992.
Coulouris et al., Distributed Systems Concepts and Designs, Second Edition, Addison-Wesley, 1994.
Birrell et al., Network Objects, DEC SRC Research Report 115, Feb. 28, 1994.
Birrell et al., Distributed Garbage Collection for Network Objects, DEC SRC Research Report 116, Dec. 15, 1993.
Wollrath et al., A Distributed Object Model for the JAVA.TM. System, USENIX Association, Conference on Object-Oriented Technologies and Systems, Jun. 17-21, 1996, pp. 219-231.
Harris et al., Proposal for a General Java Proxy Class for Distributed Systems and Other Uses, Netscape Communications Corp., Jun. 25, 1997.
Hamilton, Java and the Shift to Net-Centric Computing, Computer, Aug. 1996, pp. 31-39.
Chung et al., A "Tiny" Pascal Compiler: Part 1: The P-Code Interpreter, BYTE Publications, Inc., Sep. 1978.
Chung et al., A "Tiny" Pascal Compiler: Part 2: The P-Compiler, BYTE Publications, Inc., Oct. 1978.
Thompson, Regular Expression Search Algorithm, Communications of the ACM, vol. II, No. 6, Jun. 1968, pp. 419-422.
Mitchell et al., Mesa Language Manual, Xerox Corporation, pp. 1-150.
McDaniel, An Analysis of a Mesa Instruction Set, Xerox Corporation, May 1982, pp. 1-17.
Pier, A Retrospective on the Dorado, A High-Performance Personal Computer, Xerox Corporation, Aug. 1983, pp. 1-40.
Pier, A Retrospective on the Dorado, A High-Performance Personal Computer, IEEE Conference Proceedings, The 10th Annual International Symposium on Computer Architecture, 1983, pp. 252-269.
Krasner, The Smalltalk-80 Virtual Machine, BYTE Publications Inc., Aug. 1991, pp. 300-320.
Birrell et al., Network Objects, Operating Systems Review, ACM Press, vol. 27, No. 5, Dec. 1993, pp. 217-230.
Remote Method Invocation Specification, Sun Microsystems, Inc., (1997), http://java.sun.com/products/jdk/1.1/docs/guide/rmi/spec/rmiTOC.doc.html.
Gong Li
Scheifler Robert W.
Etienne Ario
Sun Microsystems Inc.
LandOfFree
Stack-based access control using code and executor identifiers does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Stack-based access control using code and executor identifiers, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Stack-based access control using code and executor identifiers will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1975966