Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Patent
1997-12-11
2000-04-04
Sheikh, Ayaz R.
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
709217, 709225, G06F 15163
Patent
active
060473770
ABSTRACT:
A method and apparatus for establishing and maintaining complex security rules is provided. The security rules are established through the use of "permission" classes that take advantage of the power and simplicity various features of object oriented programming, including the ability to inherit attributes and methods. For example, a permission super class is established that defines an interface to a validation method. A permission subclass may then be created which provides an implementation of the validation method. When invoked, the validation method indicates whether a given permission represented by one object belonging to a permission class encompasses the permission represented by another object belonging to a permission class. Classes are also provided for grouping permissions into sets, and for establishing protection domains for classes of objects.
REFERENCES:
patent: 4919545 (1990-04-01), Yu
patent: 5261102 (1993-11-01), Hoffman
patent: 5311591 (1994-05-01), Fischer
patent: 5421011 (1995-05-01), Camillone et al.
patent: 5577252 (1996-11-01), Nelson et al.
patent: 5742759 (1998-04-01), Nessett et al.
patent: 5761498 (1998-06-01), Ooe et al.
patent: 5781633 (1998-07-01), Tribble et al.
patent: 5787427 (1998-07-01), Benantar et al.
patent: 5815657 (1998-09-01), Williams et al.
Gong Li, et al.: "Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java.TM. Development Kit 1.2", Proceedings of the Usenix Symposium on Internet Technologies and Systems, Monterey, CA, USA, Dec. 8-11, 1997, ISBN 1-880446-91-S, 1997, Berkeley, CA, USA, Usenix Assoc., USA, pp. 103-112, XP002100907.
Wallach, D. S., et al.: "Extensible Security Architecture for Java", 16.sup.th ACM Symposium on Operating Systems Principles, Sain Malo, France, Oct. 5-8, 1997, ISSN 0163-5980, Operating Systems Review, Dec. 1997, ACM, USA, pp. 116-128, XP-0021010681.
Dean, D., et al., "Java Security: From HotJava to Netscape and Beyond," Proceedings of the 1996 IEEE Symposium on Security and Privacy, Oakland, CA, May 6-8, 1996.
Hamilton, M.A., "Java and the Shift to Net-Centric Computing," Computer, vol. 29, No. 8, Aug. 1996.
Pancholi Jigar
Sheikh Ayaz R.
Sun Microsystems Inc.
LandOfFree
Typed, parameterized, and extensible access control permissions does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Typed, parameterized, and extensible access control permissions, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Typed, parameterized, and extensible access control permissions will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-375001