AU9408901A - A system and method for a greedy pairwise clustering - Google Patents

A system and method for a greedy pairwise clustering

Info

Publication number
AU9408901A
AU9408901A AU9408901A AU9408901A AU9408901A AU 9408901 A AU9408901 A AU 9408901A AU 9408901 A AU9408901 A AU 9408901A AU 9408901 A AU9408901 A AU 9408901A AU 9408901 A AU9408901 A AU 9408901A
Authority
AU
Australia
Prior art keywords
greedy
system
method
pairwise clustering
pairwise
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
AU9408901A
Inventor
Eliyahu Dichterman
Gideon Maliniak
Ori Berger
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CAMELOT INFORMATION TECHNOLOGI
CAMELOT INFORMATION TECHNOLOGIES Ltd
Original Assignee
CAMELOT INFORMATION TECHNOLOGI
CAMELOT INFORMATION TECHNOLOGIES Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US22612800P priority Critical
Priority to US25957501P priority
Application filed by CAMELOT INFORMATION TECHNOLOGI, CAMELOT INFORMATION TECHNOLOGIES Ltd filed Critical CAMELOT INFORMATION TECHNOLOGI
Priority to PCT/IB2001/001892 priority patent/WO2002015122A2/en
Publication of AU9408901A publication Critical patent/AU9408901A/en
Application status is Pending legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/102Entity profiles
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • G06K9/6218Clustering techniques
    • G06K9/6219Hierarchical techniques, i.e. dividing or merging pattern sets so as to obtain a dendogram
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/07Indexing scheme relating to G06F21/10, protecting distributed programs or content
    • G06F2221/0775Logging
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2145Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment
AU9408901A 2000-08-18 2001-08-20 A system and method for a greedy pairwise clustering Pending AU9408901A (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US22612800P true 2000-08-18 2000-08-18
US25957501P true 2001-01-04 2001-01-04
PCT/IB2001/001892 WO2002015122A2 (en) 2000-08-18 2001-08-20 A system and method for a greedy pairwise clustering

Publications (1)

Publication Number Publication Date
AU9408901A true AU9408901A (en) 2002-02-25

Family

ID=26920229

Family Applications (4)

Application Number Title Priority Date Filing Date
AU9411001A Pending AU9411001A (en) 2000-08-18 2001-08-20 Permission level generation based on adaptive learning
AU9408401A Pending AU9408401A (en) 2000-08-18 2001-08-20 A method and an apparatus for a security policy
AU9408901A Pending AU9408901A (en) 2000-08-18 2001-08-20 A system and method for a greedy pairwise clustering
AU9408301A Pending AU9408301A (en) 2000-08-18 2001-08-20 An adaptive system and architecture for access control

Family Applications Before (2)

Application Number Title Priority Date Filing Date
AU9411001A Pending AU9411001A (en) 2000-08-18 2001-08-20 Permission level generation based on adaptive learning
AU9408401A Pending AU9408401A (en) 2000-08-18 2001-08-20 A method and an apparatus for a security policy

Family Applications After (1)

Application Number Title Priority Date Filing Date
AU9408301A Pending AU9408301A (en) 2000-08-18 2001-08-20 An adaptive system and architecture for access control

Country Status (2)

Country Link
AU (4) AU9411001A (en)
WO (4) WO2002014988A2 (en)

Families Citing this family (51)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003203140A (en) * 2001-10-30 2003-07-18 Asgent Inc Method for grasping situation of information system and device used in the same
WO2003063449A1 (en) * 2002-01-18 2003-07-31 Metrowerks Corporation System and method for monitoring network security
EP1339199A1 (en) * 2002-02-22 2003-08-27 Hewlett-Packard Company Dynamic user authentication
CA2478128A1 (en) * 2002-03-06 2003-09-12 Peregrine Systems, Inc. Method and system for a network management console
FR2838207B1 (en) * 2002-04-08 2006-06-23 France Telecom System of exchange of information has access conditions on a network of information transfer
US7302488B2 (en) * 2002-06-28 2007-11-27 Microsoft Corporation Parental controls customization and notification
EP1424618B1 (en) * 2002-11-29 2012-01-04 Sap Ag Method and computer system for protecting electronic documents
CN1417690A (en) * 2002-12-03 2003-05-14 南京金鹰国际集团软件系统有限公司 Application process audit platform system based on members
US10110632B2 (en) * 2003-03-31 2018-10-23 Intel Corporation Methods and systems for managing security policies
US9118708B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Multi-path remediation
US9118711B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US8266699B2 (en) 2003-07-01 2012-09-11 SecurityProfiling Inc. Multiple-path remediation
US8984644B2 (en) 2003-07-01 2015-03-17 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US9350752B2 (en) 2003-07-01 2016-05-24 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US20070113272A2 (en) 2003-07-01 2007-05-17 Securityprofiling, Inc. Real-time vulnerability monitoring
US9118709B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US9100431B2 (en) 2003-07-01 2015-08-04 Securityprofiling, Llc Computer program product and apparatus for multi-path remediation
US9118710B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc System, method, and computer program product for reporting an occurrence in different manners
AT419588T (en) * 2003-08-19 2009-01-15 France Telecom Method and system for evaluation of the safety of electronic devices and access control to resources
DE10348729A1 (en) 2003-10-16 2005-05-19 Vodafone Holding Gmbh Apparatus and method for backing up protected data
FR2864657B1 (en) * 2003-12-24 2006-03-24 Trusted Logic Process for the parameterizable control the security of computer systems and embedded systems implementing said METHOD
US7907934B2 (en) 2004-04-27 2011-03-15 Nokia Corporation Method and system for providing security in proximity and Ad-Hoc networks
WO2006022161A1 (en) 2004-08-25 2006-03-02 Nec Corporation Information communication device, and program execution environment control method
JP4643204B2 (en) 2004-08-25 2011-03-02 株式会社エヌ・ティ・ティ・ドコモ The server device
US7979889B2 (en) * 2005-01-07 2011-07-12 Cisco Technology, Inc. Methods and apparatus providing security to computer systems and networks
US7193872B2 (en) 2005-01-28 2007-03-20 Kasemsan Siri Solar array inverter with maximum power tracking
US7661111B2 (en) 2005-10-13 2010-02-09 Inernational Business Machines Corporation Method for assuring event record integrity
WO2007111660A2 (en) * 2005-12-13 2007-10-04 Interdigital Technology Corporation Method and system for protecting user data in a node
US8495743B2 (en) 2005-12-16 2013-07-23 Cisco Technology, Inc. Methods and apparatus providing automatic signature generation and enforcement
US7882560B2 (en) 2005-12-16 2011-02-01 Cisco Technology, Inc. Methods and apparatus providing computer and network security utilizing probabilistic policy reposturing
US8413245B2 (en) 2005-12-16 2013-04-02 Cisco Technology, Inc. Methods and apparatus providing computer and network security for polymorphic attacks
US9286469B2 (en) 2005-12-16 2016-03-15 Cisco Technology, Inc. Methods and apparatus providing computer and network security utilizing probabilistic signature generation
US8326296B1 (en) 2006-07-12 2012-12-04 At&T Intellectual Property I, L.P. Pico-cell extension for cellular network
CN101350054B (en) 2007-10-15 2011-05-25 北京瑞星信息技术有限公司 Method and apparatus for automatically protecting computer noxious program
CN101350052B (en) 2007-10-15 2010-11-03 北京瑞星信息技术有限公司 Method and apparatus for discovering malignancy of computer program
US8719420B2 (en) 2008-05-13 2014-05-06 At&T Mobility Ii Llc Administration of access lists for femtocell service
US8863235B2 (en) 2008-05-13 2014-10-14 At&T Mobility Ii Llc Time-dependent white list generation
US8504032B2 (en) 2008-06-12 2013-08-06 At&T Intellectual Property I, L.P. Femtocell service registration, activation, and provisioning
CN102308302A (en) 2009-02-10 2012-01-04 日本电气株式会社 Policy management apparatus, policy management system, and method and program used for the same
US8510801B2 (en) 2009-10-15 2013-08-13 At&T Intellectual Property I, L.P. Management of access to service in an access point
US8713056B1 (en) * 2011-03-30 2014-04-29 Open Text S.A. System, method and computer program product for efficient caching of hierarchical items
US10225249B2 (en) * 2012-03-26 2019-03-05 Greyheller, Llc Preventing unauthorized access to an application server
US10229222B2 (en) 2012-03-26 2019-03-12 Greyheller, Llc Dynamically optimized content display
US8959657B2 (en) * 2013-03-14 2015-02-17 Appsense Limited Secure data management
US9355261B2 (en) 2013-03-14 2016-05-31 Appsense Limited Secure data management
US9215251B2 (en) 2013-09-11 2015-12-15 Appsense Limited Apparatus, systems, and methods for managing data security
WO2015141630A1 (en) * 2014-03-19 2015-09-24 日本電信電話株式会社 Analysis rule adjustment device, analysis rule adjustment system, analysis rule adjustment method, and analysis rule adjustment program
CN104125335B (en) * 2014-06-24 2017-08-25 小米科技有限责任公司 Rights management method, apparatus and system
US9787685B2 (en) 2014-06-24 2017-10-10 Xiaomi Inc. Methods, devices and systems for managing authority
US20190007415A1 (en) * 2017-06-29 2019-01-03 Microsoft Technology Licensing, Llc Access control manager
US20190005110A1 (en) * 2017-06-30 2019-01-03 Sap Se Security of a computer system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6049797A (en) * 1998-04-07 2000-04-11 Lucent Technologies, Inc. Method, apparatus and programmed medium for clustering databases with categorical attributes

Also Published As

Publication number Publication date
AU9408301A (en) 2002-02-25
WO2002014987A8 (en) 2003-09-04
AU9408401A (en) 2002-02-25
WO2002015122A3 (en) 2003-12-04
WO2002014988A2 (en) 2002-02-21
AU9411001A (en) 2002-02-25
WO2002014988A8 (en) 2003-04-24
WO2002014989A8 (en) 2003-03-06
WO2002014989A2 (en) 2002-02-21
WO2002015122A2 (en) 2002-02-21
WO2002014987A2 (en) 2002-02-21

Similar Documents

Publication Publication Date Title
GB2372860B (en) Authentication system using position information
GB2398910B (en) Method and system for operating a banking service
GB2368954B (en) Distributed printing system and method
GB2380428B (en) A method and system for operating a dual-exhaust engine
GB2392524B (en) Method and system for secure information
GB2366038B (en) Information communication system and method
GB2367318B (en) Method and system for oriented perforating in a well with permanent sensors
GB2371879B (en) A system and method for an engine
GB2383279B (en) A method and system for an engine
AU2784101A (en) A memory device search system and method
AU8898301A (en) Method and system for forming a list-based value discovery network
AU9680801A (en) A system and method for providing computer based postage stamps
IL162374D0 (en) Method and system for testing traffic and auxiliary channels in a wireless data communication system
AU2001265909A1 (en) Method, device and security system, all for authenticating marking
AU2002368176A8 (en) System, method and apparatus for conducting a keyterm search
EP1164521A3 (en) Method and system for facilitating information exchange
AU5580601A (en) A method and device for forming a semantic description
AU8528401A (en) System and method for account reconciliation
AU3594601A (en) A system and method for providing reservationless conferencing
AU3045001A (en) System for acquiring data from a facility and method
AU8462001A (en) Order-handling inventory management system and method
AU6114101A (en) Method and system for achieving high availability in a networked computer system
GB2365724B (en) A system and method for authenticating electronic documents
MXPA03003757A (en) Method and system for extrusion embossing.
HK1054595A1 (en) A method of operating a ticketing system