Data processing: structural design – modeling – simulation – and em – Emulation – Compatibility emulation
Reexamination Certificate
2007-09-18
2007-09-18
Ferris, Fred (Department: 2128)
Data processing: structural design, modeling, simulation, and em
Emulation
Compatibility emulation
C709S225000, C707S793000, C713S152000, C713S152000
Reexamination Certificate
active
10131634
ABSTRACT:
A system and method for authorizing access to a controlled entity by a user. A set of user privileges is provided for user; and a content manager intersects an access control list (ACL) and the set of user privileges to authorize access. Binding level control indicia selectively binds an access control list (ACL) to the controlled entity at item type, item, mixed, or library binding level. An item type comprises one or more component items with each component item having one or more item views which together form an item type view. A content manager is responsive to the binding level to perform ACL checking for authorizing access to the controlled entity by the user.
REFERENCES:
patent: 5390312 (1995-02-01), Chairot et al.
patent: 5495533 (1996-02-01), Linehan et al.
patent: 5504892 (1996-04-01), Atsatt et al.
patent: 5552776 (1996-09-01), Wade et al.
patent: 5560005 (1996-09-01), Hoover et al.
patent: 5627987 (1997-05-01), Nozue et al.
patent: 5649099 (1997-07-01), Theimer et al.
patent: 5701458 (1997-12-01), Bsaibes et al.
patent: 5758153 (1998-05-01), Atsatt et al.
patent: 5774668 (1998-06-01), Choquier et al.
patent: 5778222 (1998-07-01), Herrick et al.
patent: 5941947 (1999-08-01), Brown et al.
patent: 6014666 (2000-01-01), Helland et al.
patent: 6052785 (2000-04-01), Lin et al.
patent: 6105027 (2000-08-01), Schneider
patent: 6141754 (2000-10-01), Choy
patent: 6161139 (2000-12-01), Win et al.
patent: 6195705 (2001-02-01), Leung
patent: 6256715 (2001-07-01), Hansen
patent: 6308173 (2001-10-01), Glasser et al.
patent: 6438549 (2002-08-01), Aldred et al.
patent: 6460141 (2002-10-01), Olden
patent: 6470353 (2002-10-01), Yaung et al.
patent: 6523027 (2003-02-01), Underwood
patent: 6581060 (2003-06-01), Choy
patent: 6609128 (2003-08-01), Underwood
patent: 6633878 (2003-10-01), Underwood
patent: 6718535 (2004-04-01), Underwood
patent: 6772350 (2004-08-01), Belani et al.
patent: 6823338 (2004-11-01), Byrne et al.
patent: 6823452 (2004-11-01), Doyle et al.
patent: 6976023 (2005-12-01), Chen et al.
patent: 7016907 (2006-03-01), Boreham et al.
patent: 2001/0037379 (2001-11-01), Livnat
patent: WO9940502 (1999-08-01), None
Sandhu et al. ‘NetWare 4 as an Example of Role-Based Access Control’. ACM Press, 1996.
Swfit et al. ‘Improving the Granularity of Access Control in Windows NT.’ ACM Workshop on Role Based Access Control. May 2001.
H.M. Gladney. “Access Control for Large Collections.” ACM Transactions on Information Systems, vol. 15, No. 2. Apr. 1997, pp. 154-157.
Abadi et al. ‘A Calculus for Access Control in Distributed Systems.’ ACM Transactions on Programming Languages and Systems, vol. 15, No. 4, Sep. 1993, pp. 706-734.
IBM Content Manager for Multiplatforms System Administration Guide. First Edition (Jan. 2001), IBM Doc. No. SC27-0868-00.
Crall, Chris et al.Authorization in Enterprise-wide Distributed System A Practical Design and Application. Proceedings 14th Annual Computer Security Applications Conference. Los Alamitos, CA: IEEE Comput. Soc., 1998. 12 pages.
Kavaln, Vasanthi et al.A Mobile Agent for Asynchronous Administration of Multiple DBMS Servers. Proceedings of the IEEE Third International Workshop on systems Management. Los Alamitos, CA: IEEE Compt. Soc., 1998. 1-2.
Hayton, Richard et al.An Open Architecture for Secure Interworking Services. Proceedings of the 17th International Conference on Distributed Computing Systems, Los Alamitos, CA: IEEE Comput. Soc. Press, 1997. 315-321.
Han, Yan et al.Constraint Specification for Object Model of Access Control Based on Role. Software Engineering Notes, vol. 25, No. 2, Mar. 2000. USA: ACM. 60-64. [Inspec Abstract AN 6580279, ABN C2000-06-6130S-023].
IBM Corp.Content Manager for Multiplatforms. Wysiwyg://2/http://www-4.ibm.com/software/data/cm/cmgr/mp/about.html; and Wysiwyg://1/http://www-4.ibm.com/software/data/cm/cmgr/mp [accessed Mar. 26, 2002 5:13 PM].
Okamoto, Tatsuaki.A Single Public-Key Authentication Scheme for Multiple Users. Systems and Computer in Japan, vol. 18, No. 10, 1987.
Thesaurus.com, Refresh (Synonyms), pp. 1-4 <URL:http://thesaurus.reference.com/browse/refresh> retrieved online Jul. 27, 2006.
Dictionary.com, Refresh (Definition), pp. 1-3 <URL:http//dictionary.reference.com/browse/refresh> retrieved online Jul. 27, 2006.
Dictionary.com, Update (Definition), pp. 1-2 <URL://dictionary.reference.com/browse/update> retrieved online Jul. 27, 2006.
Dictionary.com, Incremental (Definition), pp. 1-2 <URL:http://dictionary.reference.com/browse/incremental> retrieved online Jul. 27, 2006.
Dictionary.com, Retrieved online <URL:http//dictionary.reference.com/search?q=compile>, Compile, definition of. Mar. 30, 2006.
System and Method for RDBMS to Protect Records in Accoreance with Non-RDBMS Rules. IBM Docket No. AM9-99-0207; U.S. Appl. No. S/N 09/686,487 (pending).
Chen An Feng-I
Hu Tawei
Liang Lily
Lin Jy-Jine James
Perry Edward Joseph
Beckstrand Shelley M
Ferris Fred
Patel Shambhavi
LandOfFree
System and method for configurable binding of access control... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for configurable binding of access control..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for configurable binding of access control... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3778561