BR102013009890A2 - método para controlar interações entre um ou mais componentes de um sistema de computador, meio legível por computador e sistema de segurança para controlar interações entre um ou mais componentes de um sistema de computador - Google Patents

método para controlar interações entre um ou mais componentes de um sistema de computador, meio legível por computador e sistema de segurança para controlar interações entre um ou mais componentes de um sistema de computador Download PDF

Info

Publication number
BR102013009890A2
BR102013009890A2 BR102013009890A BR102013009890A BR102013009890A2 BR 102013009890 A2 BR102013009890 A2 BR 102013009890A2 BR 102013009890 A BR102013009890 A BR 102013009890A BR 102013009890 A BR102013009890 A BR 102013009890A BR 102013009890 A2 BR102013009890 A2 BR 102013009890A2
Authority
BR
Brazil
Prior art keywords
component
interaction
components
source
security level
Prior art date
Application number
BR102013009890A
Other languages
English (en)
Portuguese (pt)
Inventor
James Slyfield Christopher
Original Assignee
Ge Aviat Systems Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ge Aviat Systems Ltd filed Critical Ge Aviat Systems Ltd
Publication of BR102013009890A2 publication Critical patent/BR102013009890A2/pt

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6281Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Automation & Control Theory (AREA)
  • Signal Processing (AREA)
  • Mathematical Physics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Storage Device Security (AREA)
  • Hardware Redundancy (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
BR102013009890A 2012-04-27 2013-04-23 método para controlar interações entre um ou mais componentes de um sistema de computador, meio legível por computador e sistema de segurança para controlar interações entre um ou mais componentes de um sistema de computador BR102013009890A2 (pt)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GBGB1207404.3A GB201207404D0 (en) 2012-04-27 2012-04-27 Security system and method for controlling interactions between components of a computer system

Publications (1)

Publication Number Publication Date
BR102013009890A2 true BR102013009890A2 (pt) 2017-05-02

Family

ID=46330457

Family Applications (1)

Application Number Title Priority Date Filing Date
BR102013009890A BR102013009890A2 (pt) 2012-04-27 2013-04-23 método para controlar interações entre um ou mais componentes de um sistema de computador, meio legível por computador e sistema de segurança para controlar interações entre um ou mais componentes de um sistema de computador

Country Status (8)

Country Link
US (1) US9122883B2 (https=)
JP (1) JP6183889B2 (https=)
CN (1) CN103377337A (https=)
BR (1) BR102013009890A2 (https=)
CA (1) CA2813425C (https=)
DE (1) DE102013104053A1 (https=)
FR (1) FR2990037B1 (https=)
GB (2) GB201207404D0 (https=)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2013204965B2 (en) 2012-11-12 2016-07-28 C2 Systems Limited A system, method, computer program and data signal for the registration, monitoring and control of machines and devices
US9769192B2 (en) 2014-02-28 2017-09-19 Temporal Defense Systems, Llc Security evaluation systems and methods
US9887984B2 (en) 2014-10-24 2018-02-06 Temporal Defense Systems, Llc Autonomous system for secure electric system access
US10372946B1 (en) * 2016-10-17 2019-08-06 Altera Corporation Systems and methods for configuring a secure computing environment on an integrated circuit
CN112948824B (zh) * 2021-03-31 2022-04-26 支付宝(杭州)信息技术有限公司 一种基于隐私保护的程序通信方法、装置及设备
GB2624643A (en) * 2022-11-23 2024-05-29 Nchain Licensing Ag Communication protocol

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4184201A (en) 1978-04-26 1980-01-15 Sperry Rand Corporation Integrating processor element
CN1149476C (zh) * 1995-03-16 2004-05-12 松下电器产业株式会社 资源分配装置
US6934859B2 (en) 2000-06-09 2005-08-23 Northrop Grumman Corporation Authenticated search engines
JP3927376B2 (ja) * 2001-03-27 2007-06-06 日立ソフトウエアエンジニアリング株式会社 データ持ち出し禁止用プログラム
US20040139312A1 (en) * 2003-01-14 2004-07-15 General Instrument Corporation Categorization of host security levels based on functionality implemented inside secure hardware
JP4501156B2 (ja) * 2004-10-28 2010-07-14 日本電気株式会社 機密モードに応じたアクセスフォルダ切り替え方法、プログラム、及びコンピュータシステム
DE102005028663B4 (de) * 2005-06-15 2024-10-24 Volkswagen Ag Verfahren und Vorrichtung zum sicheren Kommunizieren einer Komponente eines Fahrzeugs über eine drahtlose Kommunikationsverbindung mit einem externen Kommunikationspartner
US20070143601A1 (en) 2005-12-15 2007-06-21 Arroyo Diana J System and method for authorizing information flows
FR2898445B1 (fr) * 2006-03-08 2008-11-14 Airbus France Sas Procede et dispositif de detection de tentatives d'intrusion sur une liaison de communication entre un aeronef et une station sol.
US8060744B2 (en) 2006-03-23 2011-11-15 Harris Corporation Computer architecture for an electronic device providing single-level secure access to multi-level secure file system
CN100539499C (zh) * 2006-06-02 2009-09-09 清华大学 一种安全的星形局域网计算机系统
US8826366B2 (en) * 2010-07-15 2014-09-02 Tt Government Solutions, Inc. Verifying access-control policies with arithmetic quantifier-free form constraints

Also Published As

Publication number Publication date
GB2503553B (en) 2014-07-16
GB201207404D0 (en) 2012-06-13
JP6183889B2 (ja) 2017-08-23
FR2990037A1 (fr) 2013-11-01
GB2503553A (en) 2014-01-01
CA2813425C (en) 2020-07-14
GB201307621D0 (en) 2013-06-12
DE102013104053A1 (de) 2013-10-31
US20130291057A1 (en) 2013-10-31
CN103377337A (zh) 2013-10-30
CA2813425A1 (en) 2013-10-27
FR2990037B1 (fr) 2016-09-02
US9122883B2 (en) 2015-09-01
JP2013242860A (ja) 2013-12-05

Similar Documents

Publication Publication Date Title
US8136147B2 (en) Privilege management
BR102013009890A2 (pt) método para controlar interações entre um ou mais componentes de um sistema de computador, meio legível por computador e sistema de segurança para controlar interações entre um ou mais componentes de um sistema de computador
US8789170B2 (en) Method for enforcing resource access control in computer systems
US9917863B2 (en) Method and system for implementing mandatory file access control in native discretionary access control environments
US20170005983A1 (en) Computer security architecture and related computing method
KR101565590B1 (ko) 역할기반 접근통제 및 인가된 파일 리스트를 통한 파일접근 통제 통합 시스템
US9516031B2 (en) Assignment of security contexts to define access permissions for file system objects
CN104601580A (zh) 一种基于强制访问控制的策略容器设计方法
CN105827645A (zh) 一种用于访问控制的方法、设备与系统
CN106101074A (zh) 一种面向大数据平台的基于用户分级的安全调度方法
US10318767B2 (en) Multi-tier security framework
KR102690042B1 (ko) 접근 대상의 보안 수준에 따른 암호 규칙 자동 관리 방법, 장치 및 컴퓨터-판독가능 기록매체
Ahuja Securing Container Isolation in Multi-Tenant Environments
Bishop Unix security: threats and solutions
Venelle et al. Security enhanced java: Mandatory access control for the java virtual machine
Lesas et al. PBAC4M: provenance-based access control for mobile
Villarreal et al. A pattern for whitelisting firewalls (wlf)
Clarke Zero-Trust Architecture Implementation for Securing Interoperable Health Tech Ecosystems
KR20080015176A (ko) 메타 접근통제 시스템
Guclu et al. Research Article A New Scalable and Expandable Access Control Model for Distributed Database Systems in Data Security
Yu et al. An information flow based security model for Linux clusters
RU2572385C2 (ru) Система разграничения доступа по расширениям файлов
Mitchell General concepts
Jianxiao et al. The applied research of access control model in scientific data sharing platform
EA044131B1 (ru) Способ и система предотвращения получения несанкционированного доступа к объектам корпоративной сети

Legal Events

Date Code Title Description
B03A Publication of a patent application or of a certificate of addition of invention [chapter 3.1 patent gazette]
B06F Objections, documents and/or translations needed after an examination request according [chapter 6.6 patent gazette]
B06U Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette]
B09A Decision: intention to grant [chapter 9.1 patent gazette]
B11D Dismissal acc. art. 38, par 2 of ipl - failure to pay fee after grant in time