ATE465464T1 - System und verfahren zum repräsentieren mehrerer security-gruppen als ein einziges datenobjekt - Google Patents
System und verfahren zum repräsentieren mehrerer security-gruppen als ein einziges datenobjektInfo
- Publication number
- ATE465464T1 ATE465464T1 AT04729114T AT04729114T ATE465464T1 AT E465464 T1 ATE465464 T1 AT E465464T1 AT 04729114 T AT04729114 T AT 04729114T AT 04729114 T AT04729114 T AT 04729114T AT E465464 T1 ATE465464 T1 AT E465464T1
- Authority
- AT
- Austria
- Prior art keywords
- group
- set value
- complex
- value
- data object
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Bioethics (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
- Alarm Systems (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/455,165 US7480798B2 (en) | 2003-06-05 | 2003-06-05 | System and method for representing multiple security groups as a single data object |
PCT/EP2004/005185 WO2004109480A2 (en) | 2003-06-05 | 2004-04-23 | System and method for representing multiple security groups as a single data object |
Publications (1)
Publication Number | Publication Date |
---|---|
ATE465464T1 true ATE465464T1 (de) | 2010-05-15 |
Family
ID=33510410
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AT04729114T ATE465464T1 (de) | 2003-06-05 | 2004-04-23 | System und verfahren zum repräsentieren mehrerer security-gruppen als ein einziges datenobjekt |
Country Status (7)
Country | Link |
---|---|
US (2) | US7480798B2 (de) |
EP (1) | EP1634137B1 (de) |
KR (1) | KR100773002B1 (de) |
CN (1) | CN100361037C (de) |
AT (1) | ATE465464T1 (de) |
DE (1) | DE602004026722D1 (de) |
WO (1) | WO2004109480A2 (de) |
Families Citing this family (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7526347B2 (en) * | 2003-02-18 | 2009-04-28 | Fisher-Rosemount Systems, Inc. | Security for objects in a process plant configuration system |
US7523128B1 (en) * | 2003-03-18 | 2009-04-21 | Troux Technologies | Method and system for discovering relationships |
US8234223B1 (en) | 2005-04-28 | 2012-07-31 | Troux Technologies, Inc. | Method and system for calculating cost of an asset using a data model |
US20070061593A1 (en) * | 2005-09-15 | 2007-03-15 | Ufuk Celikkan | Sending secured data |
US20070079382A1 (en) * | 2005-09-15 | 2007-04-05 | Ufuk Celikkan | Authorizing computer services |
US8214877B1 (en) * | 2006-05-22 | 2012-07-03 | Troux Technologies | System and method for the implementation of policies |
US8230484B1 (en) * | 2007-05-01 | 2012-07-24 | Emc Corporation | Control of resource access privileges via agent authentication |
US8001604B2 (en) * | 2007-11-06 | 2011-08-16 | International Business Machines Corporation | Method and apparatus for masking child user authorizations from adverse use against a parent user |
US8635592B1 (en) | 2011-02-08 | 2014-01-21 | Troux Technologies, Inc. | Method and system for tailoring software functionality |
US8479302B1 (en) * | 2011-02-28 | 2013-07-02 | Emc Corporation | Access control via organization charts |
US9495393B2 (en) | 2011-07-27 | 2016-11-15 | EMC IP Holding Company, LLC | System and method for reviewing role definitions |
US9280581B1 (en) | 2013-03-12 | 2016-03-08 | Troux Technologies, Inc. | Method and system for determination of data completeness for analytic data calculations |
KR20150077643A (ko) * | 2013-12-30 | 2015-07-08 | 한국전자통신연구원 | 다중사용자 무선통신시스템에서 사용자를 식별하는 장치 및 방법 |
US9548897B2 (en) | 2014-01-17 | 2017-01-17 | Amazon Technologies, Inc. | Network entity registry for network entity handles included in network traffic policies enforced for a provider network |
CN110858833B (zh) | 2018-08-22 | 2022-09-30 | 京东方科技集团股份有限公司 | 访问控制策略配置方法、装置和系统以及存储介质 |
CN113612730B (zh) * | 2021-07-05 | 2023-04-07 | 裕太微电子股份有限公司 | 一种acl访问规则控制方法、处理装置及系统 |
US11928517B2 (en) * | 2021-07-08 | 2024-03-12 | EMC IP Holding Company LLC | Feature resource self-tuning and rebalancing |
Family Cites Families (41)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4525780A (en) * | 1981-05-22 | 1985-06-25 | Data General Corporation | Data processing system having a memory using object-based information and a protection scheme for determining access rights to such information |
DE69031191T2 (de) * | 1989-05-15 | 1998-02-12 | Ibm | System zur Steuerung von Zugriffsprivilegien |
US5129083A (en) * | 1989-06-29 | 1992-07-07 | Digital Equipment Corporation | Conditional object creating system having different object pointers for accessing a set of data structure objects |
US5263157A (en) * | 1990-02-15 | 1993-11-16 | International Business Machines Corporation | Method and system for providing user access control within a distributed data processing system by the exchange of access control profiles |
US5315657A (en) * | 1990-09-28 | 1994-05-24 | Digital Equipment Corporation | Compound principals in access control lists |
US5173939A (en) * | 1990-09-28 | 1992-12-22 | Digital Equipment Corporation | Access control subsystem and method for distributed computer system using compound principals |
US5454101A (en) * | 1992-09-15 | 1995-09-26 | Universal Firmware Industries, Ltd. | Data storage system with set lists which contain elements associated with parents for defining a logical hierarchy and general record pointers identifying specific data sets |
US5454039A (en) * | 1993-12-06 | 1995-09-26 | International Business Machines Corporation | Software-efficient pseudorandom function and the use thereof for encryption |
DE69601149T2 (de) * | 1995-07-03 | 1999-08-05 | Sun Microsystems, Inc., Mountain View, Calif. 94043-1100 | Systen und Verfahren zum Implementieren einer hierarchischen Politik für die Administration eines Computersystems |
US5787427A (en) * | 1996-01-03 | 1998-07-28 | International Business Machines Corporation | Information handling system, method, and article of manufacture for efficient object security processing by grouping objects sharing common control access policies |
US5768519A (en) * | 1996-01-18 | 1998-06-16 | Microsoft Corporation | Method and apparatus for merging user accounts from a source security domain into a target security domain |
US6023765A (en) * | 1996-12-06 | 2000-02-08 | The United States Of America As Represented By The Secretary Of Commerce | Implementation of role-based access control in multi-level secure systems |
US6408336B1 (en) * | 1997-03-10 | 2002-06-18 | David S. Schneider | Distributed administration of access to information |
US6125408A (en) * | 1997-03-10 | 2000-09-26 | Compaq Computer Corporation | Resource type prioritization in generating a device configuration |
US5878415A (en) * | 1997-03-20 | 1999-03-02 | Novell, Inc. | Controlling access to objects in a hierarchical database |
US6064656A (en) | 1997-10-31 | 2000-05-16 | Sun Microsystems, Inc. | Distributed system and method for controlling access control to network resources |
US6202066B1 (en) * | 1997-11-19 | 2001-03-13 | The United States Of America As Represented By The Secretary Of Commerce | Implementation of role/group permission association using object access type |
US6044466A (en) * | 1997-11-25 | 2000-03-28 | International Business Machines Corp. | Flexible and dynamic derivation of permissions |
JP3867388B2 (ja) * | 1998-02-12 | 2007-01-10 | 富士ゼロックス株式会社 | 条件付き認証装置および方法 |
JPH11313102A (ja) * | 1998-02-27 | 1999-11-09 | Fujitsu Ltd | アクセス制御リスト生成方法及びその装置 |
US6457130B2 (en) * | 1998-03-03 | 2002-09-24 | Network Appliance, Inc. | File access control in a multi-protocol file server |
US6772350B1 (en) * | 1998-05-15 | 2004-08-03 | E.Piphany, Inc. | System and method for controlling access to resources in a distributed environment |
US6466932B1 (en) * | 1998-08-14 | 2002-10-15 | Microsoft Corporation | System and method for implementing group policy |
US6412070B1 (en) * | 1998-09-21 | 2002-06-25 | Microsoft Corporation | Extensible security system and method for controlling access to objects in a computing environment |
US6625603B1 (en) * | 1998-09-21 | 2003-09-23 | Microsoft Corporation | Object type specific access control |
US6532505B1 (en) * | 1999-11-12 | 2003-03-11 | Infineon Technologies Ag | Universal resource access controller |
US6651096B1 (en) * | 1999-04-20 | 2003-11-18 | Cisco Technology, Inc. | Method and apparatus for organizing, storing and evaluating access control lists |
US6581060B1 (en) * | 2000-06-21 | 2003-06-17 | International Business Machines Corporation | System and method for RDBMS to protect records in accordance with non-RDBMS access control rules |
US7350204B2 (en) * | 2000-07-24 | 2008-03-25 | Microsoft Corporation | Policies for secure software execution |
US7305701B2 (en) * | 2001-04-30 | 2007-12-04 | Microsoft Corporation | Methods and arrangements for controlling access to resources based on authentication method |
US7152046B2 (en) * | 2001-05-31 | 2006-12-19 | Contentguard Holdings, Inc. | Method and apparatus for tracking status of resource in a system for managing use of the resources |
US7380271B2 (en) * | 2001-07-12 | 2008-05-27 | International Business Machines Corporation | Grouped access control list actions |
US6910041B2 (en) * | 2001-08-23 | 2005-06-21 | International Business Machines Corporation | Authorization model for administration |
US7249379B2 (en) * | 2002-02-01 | 2007-07-24 | Systems Advisory Group Enterprises, Inc. | Method and apparatus for implementing process-based security in a computer system |
US6678828B1 (en) * | 2002-07-22 | 2004-01-13 | Vormetric, Inc. | Secure network file access control system |
US7107538B1 (en) * | 2002-09-12 | 2006-09-12 | Novell, Inc. | Enforcing security on an attribute of an object |
US20040088563A1 (en) * | 2002-11-01 | 2004-05-06 | Hogan Dirk J. | Computer access authorization |
US7900240B2 (en) * | 2003-05-28 | 2011-03-01 | Citrix Systems, Inc. | Multilayer access control security system |
CA2459004A1 (en) * | 2004-02-20 | 2005-08-20 | Ibm Canada Limited - Ibm Canada Limitee | Method and system to control data acces using security label components |
US7484237B2 (en) * | 2004-05-13 | 2009-01-27 | Hewlett-Packard Development Company, L.P. | Method and apparatus for role-based security policy management |
US7827402B2 (en) * | 2004-12-01 | 2010-11-02 | Cisco Technology, Inc. | Method and apparatus for ingress filtering using security group information |
-
2003
- 2003-06-05 US US10/455,165 patent/US7480798B2/en active Active
-
2004
- 2004-04-23 EP EP04729114A patent/EP1634137B1/de not_active Expired - Lifetime
- 2004-04-23 CN CNB2004800219009A patent/CN100361037C/zh not_active Expired - Lifetime
- 2004-04-23 DE DE602004026722T patent/DE602004026722D1/de not_active Expired - Lifetime
- 2004-04-23 KR KR1020057021116A patent/KR100773002B1/ko not_active IP Right Cessation
- 2004-04-23 AT AT04729114T patent/ATE465464T1/de not_active IP Right Cessation
- 2004-04-23 WO PCT/EP2004/005185 patent/WO2004109480A2/en active Search and Examination
-
2008
- 2008-12-17 US US12/337,593 patent/US7757277B2/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
EP1634137A2 (de) | 2006-03-15 |
CN100361037C (zh) | 2008-01-09 |
WO2004109480A2 (en) | 2004-12-16 |
US20090100510A1 (en) | 2009-04-16 |
US7757277B2 (en) | 2010-07-13 |
DE602004026722D1 (de) | 2010-06-02 |
US7480798B2 (en) | 2009-01-20 |
WO2004109480A3 (en) | 2005-06-16 |
US20050021952A1 (en) | 2005-01-27 |
KR20060023962A (ko) | 2006-03-15 |
EP1634137B1 (de) | 2010-04-21 |
CN1829949A (zh) | 2006-09-06 |
KR100773002B1 (ko) | 2007-11-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
ATE465464T1 (de) | System und verfahren zum repräsentieren mehrerer security-gruppen als ein einziges datenobjekt | |
EP1394657A3 (de) | Verfahren und Vorrichtung zur sequenziellen Verarbeitung eines biometrischen Musters | |
CN104573473B (zh) | 一种解锁管理权限的方法和认证设备 | |
ATE48327T1 (de) | Verfahren und vorrichtung um dem inhaber eines tragbaren objektes, insbesondere einer karte, mit dieser karte den zugriff zu einer dienstleistung von wenigstens einer berechtigenden stelle zu ermoeglichen. | |
WO1999016031A3 (en) | Method and apparatus for asymmetric key management in a cryptographic system | |
DE60044168D1 (de) | Verfahren zur sicherung einer elektronischen verschlüsselungsvorrichtung mit geheimschlüssel gegen angriffe mittels physischer analyse | |
JP2006512864A5 (de) | ||
ATE343273T1 (de) | Biometrisches authentifizierungssystem | |
DE1155366T1 (de) | Techniken zum gewähren des zugriffs durch eine kontextsperre in einem gerät mit kleinem platzbedarf unter verwendung von einem eingangspunktobjekt | |
EP4357945A3 (de) | Verfahren zum lesen eines attributs aus einem id-token | |
CN106372481A (zh) | 一种指纹排列组合密码 | |
CN111327413B (zh) | 一种侧信道数据处理方法及设备 | |
CN104573493B (zh) | 一种软件保护方法和系统 | |
DE1163579T1 (de) | Techniken zum gewähren des zugriffs durch eine kontextsperre in einem gerät mit kleinem platzbedarf unter verwendung von laufzeitumgebungsprivilegien | |
CN102457491A (zh) | 动态身份认证方法和系统 | |
CN112000933A (zh) | 应用软件的激活方法、装置、电子设备及存储介质 | |
CN114218176A (zh) | 一种跨平台数据安全共享交换方法 | |
US20130152179A1 (en) | System and method for user authentication using one-time identification | |
CN102983969A (zh) | 一种操作系统的安全登录系统及安全登录方法 | |
CN111865998A (zh) | 网络安全区登录方法及装置 | |
CN110516427B (zh) | 终端用户的身份验证方法、装置、存储介质及计算机设备 | |
CN114647824B (zh) | 一种神经网络主动保护方法、系统、存储介质及计算设备 | |
WO2004012029A3 (en) | Restricting access to a method in a component | |
US20230022849A1 (en) | Methods and systems for providing data from an internal data processing system of an industrial plant to an external data processing system | |
DE60108645D1 (de) | Verfahren und vorrichtung zur zentralisierten authentifizierung |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
RER | Ceased as to paragraph 5 lit. 3 law introducing patent treaties |