Method for implementing fine-grained access control using...

Data processing: database and file management or data structures – Database and file access – Database access control methods

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

07958150

ABSTRACT:
Disclosed is a data processing system-implemented method, a data processing system and an article of manufacture for controlling access to data stored on a database having relational objects for which access restrictions are defined for elements of the relational objects The data processing system-implemented method includes receiving a user request to access one or more relational objects of the database, identifying any access restrictions defined for the one or more relational objects, determining whether any identified access restrictions are applicable to the user request, determining whether any determined applicable access restrictions are to be enforced for the user request, and allowing access to the one or more relational objects based on the determined enforceable access restrictions.

REFERENCES:
patent: 5815574 (1998-09-01), Fortinsky
patent: 6026388 (2000-02-01), Liddy et al.
patent: 6085191 (2000-07-01), Fisher et al.
patent: 6308273 (2001-10-01), Goertzel et al.
patent: 6321235 (2001-11-01), Bird
patent: 6321334 (2001-11-01), Jerger et al.
patent: 6424974 (2002-07-01), Cotner et al.
patent: 6487552 (2002-11-01), Lei et al.
patent: 6643633 (2003-11-01), Chau et al.
patent: 6721727 (2004-04-01), Chau et al.
patent: 2003/0046550 (2003-03-01), Carroll et al.
patent: 2004/0139043 (2004-07-01), Lei et al.
patent: 2005/0246338 (2005-11-01), Bird
patent: 2007/0033196 (2007-02-01), Moore
Tzelepi, S et al,Security of Medical Multimedia, Medical Informatics and the Internet in Medicine, vol. 27, No. 3, Sep. 2002, pp. 169-184.
Damiani, E., et al,Regulating Access to Semistructured Information on the WebInformation Security for Global Information Infrastructures, Sixteenth Annual Working Conf. on Information Security, Aug. 22-24, 2000, Beijing, China, pp. 351-360.
Duesterwald, E.,A Practical Data Flow Framework for Array Reference Analysis and its Use in Optimizations, ACM Sigplan Notices vol. 28, No. 6, Jun. 1993, Proc of the ACM SIGPLAN '93 Conf on Progrmming Language Design and Implementation Albuquerque, NM, Jun. 23-25, 1993, pp. 68-77.
Low, M et al.,Fine Grained Object Protection in Unix, Operating Systems Review vol. 27, No. 1, Jan. 1993, pp. 33-50.
Salemi, C. et al.,A Privilege Mechanism for UNIX System V Release 4 Operating Systems, Conf Proceedings, USENIX, Summer 1992 Technical Conf, San Antonio, Texas, Jun. 8-12, 1992, pp. 235-241.
Leiss, E, et al,Protecting Statistical Databases by Combining Memoryless Table Restrictions With Randomization, AFIPS Conf, Proc., vol. 56, 1987 National Computer Conference, Jun. 15-18, 1987, Chicago, Illinois, pp. 591-600.
Damiani, E., et al.,A Fine-Grained Access Control System for XML Documents, ACM Transactions on Information and System Security, vol. 5, No. 2, May 2002, pp. 169-202.
Grimm, R., et al,Separating Access Control Policy, Enforcement, and Functionality in Extensible Systems, ACM Transactions on Computer Systems, vol. 19, No. 1, Feb. 2001, pp. 36-70.
Coulouris, G., et al,Security Requirements for Cooperative Work: A Model and Its System ImplicationsPosition paper for 6thSIGOPS European Workshop, Dagstuhl, Sep. 1994. pp. 184-186.
Wang, Weigang,Team-and-Role Based Organizational Context and Access Control for Cooperative Hypermedia Environments, Hypertext 99, Darmstadt Germany, Copyright ACM 1999, pp. 37-46.
Bohlen, Michael H. et al., “Temporal Statements Modifiers,” ACM Transaction on Database Systems, vol. 25, No. 4, Dec. 2000, pp. 407-456.
Lakshmanan, Laks, V.S. et al., “SchemaSQL-An Extension to SQL for Multidatabase Interoperability,” ACM Transactions on Database Systems, vol. 26, No. 4, Dec. 2001, pp. 476-519.
Ng, Wilfred, “An Extension of the Relational Data Model to Incorporate Ordered Domains,” ACM Transactions on Database Systems, vol. 26, No. 3, Sep. 2001, pp. 344-383.
Hadjiefthymiades, SP et al., “A Generic Framework for the Deployment of Structured Databases on the World Wide Web,” Computer Networks and ISDN Systems, May 1996, vol. 28, No. 7-11, pp. 1139-1148. (Abstract).
Zenchuan, Xu et al., “Dynamic Tuning of XML Storage Schema in VXMLR,” 2003, Proceedings International Database Engineering and Applications Symposium, pp. 76-78. (Abstract).
Rakesh Agrawal, et al., “Extending Relational Database Systems to Automatically Enforce Privacy Policies”, IBM Almaden Research Center, 650 Harry Road, San Jose, CA, Proceedings of the 21st International Conference on Data Engineering, IEEE, 2005.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for implementing fine-grained access control using... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for implementing fine-grained access control using..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for implementing fine-grained access control using... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2671236

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.