System and method for role based analysis and access control

Data processing: database and file management or data structures – Database and file access – Database access control methods

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C707S797000

Reexamination Certificate

active

07933925

ABSTRACT:
A system and method for program access control includes, for a typestate, providing typestate properties and assigning a role to the typestate in a program in accordance with the typestate properties. Access to operations is limited for the typestate in the program based on the role assigned to the typestate and an access permission level.

REFERENCES:
patent: 5347578 (1994-09-01), Duxbury
patent: 5581691 (1996-12-01), Hsu et al.
patent: 5634127 (1997-05-01), Cloud et al.
patent: 5911143 (1999-06-01), Deinhart et al.
patent: 6088679 (2000-07-01), Barkley
patent: 6938186 (2005-08-01), Das et al.
patent: 6950825 (2005-09-01), Chang et al.
patent: 7350237 (2008-03-01), Vogel et al.
patent: 2005/0262132 (2005-11-01), Morita et al.
patent: 2006/0059567 (2006-03-01), Bird et al.
patent: 2007/0074188 (2007-03-01), Huang et al.
Patrick Lam, Viktor Kuncak, Martin Rinard, Generalized Typestate Checking Using Set Interfaces and Pluggable Analysis, Mar. 2004, vol. 39(3), 46-55.
Viktor Kuncak, Patrick Lam, Martin Rinard, Role Analysis, Jan. 2002,ACM, 16-32.
Patrick Lam, Viktor Kuncak, and Martin Rinard; “Generalized Typestate Checking Using Set Interfaces and Pluggable Analyses”; SIGPLAN Notices; 2004.
Eric Armstrong et al., The J2EE 1.4 Tutorial Sun Java System Application Server Platform Edition 8.1 2005Q2 UR2; Jun. 7, 2005; pp. 1-1500.
A. Banerjee et al., “Representation Independence, Confinement and Access Control [extended abstract and appendices]”; POPL 02: Proceedings of the 29th ACM SIGPLAN-SIGACT Symposium on Princeples of Programming Languages, NY NY 2002; pp. 1-15.
A. Banerjee et al., “Secure Information Flow and Pointer Confinement in a Java-like Language”; CSFW '02: Proceedings of the 15th IEEE Computer Security Foundations Workshop; Washington, DC; 2002; pp. 1-15.
A. Banerjee et al., “Stack-Based Access Control and Secure Information Flow”, J. Funct. Program, 15(2): 2005; pp. 131-177.
D. E. Bell et al., “Secure Computer System: Unified Exposition and Multics Interpretation” Technical Report MTR-2997, MITRE Corporation, Mar. 1976; pp. 1-129.
Jong-Deok Choi et al., “Escape Analysis for Java”, Proceedings of ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages and Applications; NY NY; 1999; pp. 1-19.
R. Deline et al., “Typestates for Objects” 18th European Conf. on Object-Oriented Programming,; 2004; pp. 1-26.
David Ferraiolo et al., “Role-Based Access Control”, 15th NIST-NCC Nat'l Computer Security Conference, Baltimore MD, Oct. 1992; pp. 1-11.
David Ferraiolo et al., “Proposed NIST Standard for Role-Based Access Control”, ACM Trans. Inf. Syst. Secur. 4(3); 2001; pp. 224-274.
Frederic Vivien et al., “Incrementalized Pointer and Escape Analysis”, PLDI '01: Proceedings of the ACM SIGPLAN 2001 COnference on Programming Language Design and Implementation; ACM Press; NY, NY 2001; 12 pages.
David Grove et al., “A Framework for Call Graph Construction Algorithms” ACM Trans. on Programming Languages and Systesm, vol. 23, No. 6, Nov. 2001; pp. 685-746.
Michael Hind, “Pointer Analysis: Haven't We Solved This Problem Yet?” PASTE '01: Proceedings of the 2001 ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering, NY NY, ACM; 2001; 8 pages.
Patrick Lam et al., “Generalized Typestate Checking Using Set Interfaces and Pluggable Analyses”, SIGPLAN Not., 39 (3); 2004; pp. 1-10.
Ninghui Li et al., “Security Analysis in Role-Based Access Control”., SACMAT '04; Proceeding of the ninth ACM Symposium on Access Control Models and Technologies, NY NY, 2004; ACM Press; pp. 126-135.
V. Benjamin Livshits et al., “Finding Security Vulnerabilities in Java Applications with Static Analysis”, Proceeding of the 14th USENIX Security Symposium, 2005; 16 pages.
Gleb Naumovich et al., “Static Analysis of Role-Based Access Control in J2EE Applications”, Workshop on Testing, Analysis and Verification of Web Services, NY NY 2004; ACM Press; 10 pages.
S.L. Osborn et al., “Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies”, ACM Transactions on Information and System Security, vol. 3, No. 2, May 2000; pp. 85-106.
Young Gil Park et al., “Escape Analysis on Lists”, PLDI '92; Proceedings of the ACM SIGPLAN 1992 Conference on Programming Language Design and Implementation; NY NY, ACM Press; 1992; 12 pages.
Marco Pistoia et al., “Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection”, 19th European Conference on Object-Oriented Programming, 2005; 25 pages.
Marco Pistoia et al., Static Evaluation of Role-Based Access Control Policies in Distributed Component-Based Systems: Technologies Report RC23836 (W0411-166); IBM TJ Watson Research Center, IBM Research Division, Yorktown, NY; Nov. 2004; pp. 1-18.
Santhosh Kumaran et al., “Adaptive Business Objects: A New Component Model for Business Integration”; 7th International Conference on Enterprise Information Systems (ICEIS 2005) May 24-28, Miami, FL; 14 pages.
Bruno Blanchet et al., Escape Analysis for Object-Oriented Languages: Application to Java:, OOPSLA '99; Proceedings of the 14th ACM SIGPLAN Conference on Object-oriented programming systems, languages and applications; 1999; pp. 20-34.
Ravi S. Sandhu et al., “Role-Based Access Control Models”, IEEE Computer 29(2); 1996; pp. 38-47.
Torben Amtoft et al., “A Logic for Information Flow in Object-Oriented Programs”, ACM 2006; pp.1-12.
David Harel, “Statecharts: A Visual Formalism for Complex Systems”, Science of Computer Programming 8(3); 1987; pp. 231-274.
Robert E. Strom et al., “Typestate: A Programming Language Concept for Enhancing Software Reliability”, IEEE; vol. SE-12, No. 1 Jan. 1986; pp. 157-171.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for role based analysis and access control does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for role based analysis and access control, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for role based analysis and access control will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2738413

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.