ATE535877T1 - Gesteuerte pfadbasierte prozessausführung - Google Patents

Gesteuerte pfadbasierte prozessausführung

Info

Publication number
ATE535877T1
ATE535877T1 AT05292211T AT05292211T ATE535877T1 AT E535877 T1 ATE535877 T1 AT E535877T1 AT 05292211 T AT05292211 T AT 05292211T AT 05292211 T AT05292211 T AT 05292211T AT E535877 T1 ATE535877 T1 AT E535877T1
Authority
AT
Austria
Prior art keywords
backend
checking
modules
attribute certificate
process level
Prior art date
Application number
AT05292211T
Other languages
English (en)
Inventor
Maarten E Rits
Original Assignee
Sap Ag
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sap Ag filed Critical Sap Ag
Application granted granted Critical
Publication of ATE535877T1 publication Critical patent/ATE535877T1/de

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
AT05292211T 2005-10-20 2005-10-20 Gesteuerte pfadbasierte prozessausführung ATE535877T1 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP05292211A EP1780653B1 (de) 2005-10-20 2005-10-20 Gesteuerte pfadbasierte Prozessausführung

Publications (1)

Publication Number Publication Date
ATE535877T1 true ATE535877T1 (de) 2011-12-15

Family

ID=35789178

Family Applications (1)

Application Number Title Priority Date Filing Date
AT05292211T ATE535877T1 (de) 2005-10-20 2005-10-20 Gesteuerte pfadbasierte prozessausführung

Country Status (3)

Country Link
US (1) US7797534B2 (de)
EP (1) EP1780653B1 (de)
AT (1) ATE535877T1 (de)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE602007000681D1 (de) * 2007-01-19 2009-04-23 Sap Ag Verfahren und System zur sicheren Erweiterung des Weges eines Mobilagenten innerhalb eines Netzwerksystems
US8904169B2 (en) * 2009-09-15 2014-12-02 Symantec Corporation Just in time trust establishment and propagation
US20120185936A1 (en) * 2011-01-19 2012-07-19 General Electric Company Systems and Methods for Detecting Fraud Associated with Systems Application Processing
US9020973B2 (en) * 2011-12-27 2015-04-28 Sap Se User interface model driven data access control
US9317411B2 (en) 2013-07-31 2016-04-19 Bank Of America Corporation Testing coordinator
US10127141B2 (en) 2017-02-20 2018-11-13 Bank Of America Corporation Electronic technology resource evaluation system
US11784832B2 (en) * 2020-05-26 2023-10-10 Indeed, Inc. Automatically managing user message conveyance utilizing multiple messaging channels

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU662805B2 (en) * 1992-04-06 1995-09-14 Addison M. Fischer A method for processing information among computers which may exchange messages
US6138235A (en) * 1998-06-29 2000-10-24 Sun Microsystems, Inc. Controlling access to services between modular applications
EP1762958A1 (de) * 1999-03-08 2007-03-14 Spyrus, Inc. Verfahren und System zur Verschaffung des Zugangs zu einer Computerressource unter Verwendung eines Lizenzierungszertifikats
GB2366879B (en) * 2000-09-16 2005-02-16 Ibm Tracing the execution path of a computer program
FR2816730B1 (fr) * 2000-11-13 2004-10-15 Commissariat Energie Atomique Procede de securisation rendant deterministe l'execution en temps reel d'applications multitaches du type controle- commande avec confinement d'erreur
EP1507185A1 (de) * 2003-08-11 2005-02-16 Axalto S.A. Verfahren und Vorrichtung zum Schutz gegen nicht autorisierten Zugang zu einem sicheren Programm
ATE527616T1 (de) 2004-12-23 2011-10-15 Sap Ag Umgekehrtes herleiten von zugriffsteuerungen

Also Published As

Publication number Publication date
EP1780653A1 (de) 2007-05-02
EP1780653B1 (de) 2011-11-30
US20070094349A1 (en) 2007-04-26
US7797534B2 (en) 2010-09-14

Similar Documents

Publication Publication Date Title
ATE535877T1 (de) Gesteuerte pfadbasierte prozessausführung
Westcott et al. OptiClust, an improved method for assigning amplicon-based sequence data to operational taxonomic units
Westcott et al. OptiClust, an improved method for assigning amplicon-based sequence data to operational taxonomic units. mSphere 2: e00073-17
JP2017033521A (ja) 異質情報を統合及び表示(提示)するためのコンピュータ利用システム及びコンピュータ利用方法
WO2012099643A3 (en) Integrated environment for execution monitoring and profiling of applications running on multi-processor system-on-chip
Cordone et al. Parsimonious monitor control of Petri net models of flexible manufacturing systems
RU2011144585A (ru) Устройство обработки информации, способ обработки информации и компьютерный носитель данных
MX358408B (es) Ensayos interrogatorios basados en celulas y usos de los mismos.
JP2017507572A5 (de)
Seifert et al. Virtual high-throughput screening of molecular databases.
JP2005520225A5 (de)
DE602007004587D1 (de) Verschleierung von Ausführungsspuren eines Computerprogrammcodes
ATE511265T1 (de) Vorrichtung, system und verfahren zum dynamischen bestimmen einer menge von speicherbereichnetzwerkkomponenten zur überwachung der leistungsfähigkeit
RU2009116231A (ru) Архитектура виртуального модуля безопасности
ATE442616T1 (de) System, verfahren und computerprogrammprodukt zur maschinenwerkzeug-programmierung
JP2009134741A5 (de)
JP2006048531A5 (de)
FR2961922B1 (fr) Procede de compilation selective, dispositif et produit programme d'ordinateur correspondant.
FR2991076B1 (fr) Procede de traitement d'un ensemble de quadruplets de valeurs relatifs a des points de fonctionnement d'un accumulateur electrochimique, procede de determination d'un etat d'energie a partir des donnees issues du procede de traitement, support d'enregistrement, programme informatique et dispositif
WO2007047934A3 (en) Method and apparatus for increasing throughput in a storage server
TW200736951A (en) Identification of input sequences
CN109446441B (zh) 一种通用的网络社区可信分布式采集存储系统
JP2010020688A5 (de)
RU2013143837A (ru) Система параллельной обработки данных и способ работы системы параллельной обработки данных
Grant et al. Reverse engineering co-maintenance relationships using conceptual analysis of source code