CA2018319A1 - Methode pour assurer le secret et l'integrite des fichiers dans un systeme informatique - Google Patents

Methode pour assurer le secret et l'integrite des fichiers dans un systeme informatique

Info

Publication number
CA2018319A1
CA2018319A1 CA2018319A CA2018319A CA2018319A1 CA 2018319 A1 CA2018319 A1 CA 2018319A1 CA 2018319 A CA2018319 A CA 2018319A CA 2018319 A CA2018319 A CA 2018319A CA 2018319 A1 CA2018319 A1 CA 2018319A1
Authority
CA
Canada
Prior art keywords
file
secrecy
security
computer system
security label
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA2018319A
Other languages
English (en)
Other versions
CA2018319C (fr
Inventor
Larry Alan Wehr
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Micro Focus Software Inc
Original Assignee
American Telephone and Telegraph Co Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by American Telephone and Telegraph Co Inc filed Critical American Telephone and Telegraph Co Inc
Publication of CA2018319A1 publication Critical patent/CA2018319A1/fr
Application granted granted Critical
Publication of CA2018319C publication Critical patent/CA2018319C/fr
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2145Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
CA002018319A 1989-06-30 1990-06-05 Methode pour assurer le secret et l'integrite des fichiers dans un systeme informatique Expired - Lifetime CA2018319C (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US37438089A 1989-06-30 1989-06-30
US374,380 1989-06-30

Publications (2)

Publication Number Publication Date
CA2018319A1 true CA2018319A1 (fr) 1990-12-31
CA2018319C CA2018319C (fr) 1997-01-07

Family

ID=23476563

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002018319A Expired - Lifetime CA2018319C (fr) 1989-06-30 1990-06-05 Methode pour assurer le secret et l'integrite des fichiers dans un systeme informatique

Country Status (4)

Country Link
EP (1) EP0407060B1 (fr)
JP (1) JPH0341535A (fr)
CA (1) CA2018319C (fr)
DE (1) DE69029880T2 (fr)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5574912A (en) * 1990-05-04 1996-11-12 Digital Equipment Corporation Lattice scheduler method for reducing the impact of covert-channel countermeasures
US5414844A (en) * 1990-05-24 1995-05-09 International Business Machines Corporation Method and system for controlling public access to a plurality of data objects within a data processing system
US5276901A (en) * 1991-12-16 1994-01-04 International Business Machines Corporation System for controlling group access to objects using group access control folder and group identification as individual user
US5586301A (en) * 1994-11-09 1996-12-17 Ybm Technologies, Inc. Personal computer hard disk protection system
US5657470A (en) * 1994-11-09 1997-08-12 Ybm Technologies, Inc. Personal computer hard disk protection system
US5819091A (en) * 1994-12-22 1998-10-06 Arendt; James Wendell User level control of degree of client-side processing
US7406603B1 (en) 1999-08-31 2008-07-29 Intertrust Technologies Corp. Data protection systems and methods
GB9923340D0 (en) * 1999-10-04 1999-12-08 Secr Defence Improvements relating to security
DE10008153A1 (de) * 2000-02-22 2001-06-21 Primasoft Gmbh Verfahren zur Sicherung von in einer digitalen Verarbeitungseinheit abgelegten Daten gegen unbefugten Zugriff
DE10113828A1 (de) * 2001-03-21 2002-09-26 Infineon Technologies Ag Prozessor zum sicheren Verarbeiten von Daten unter Verwendung einer Datensicherheitsmarke und/oder von Befehlen unter Verwendung einer Befehlssicherheitsmarke
EP1698958A1 (fr) * 2005-02-25 2006-09-06 Axalto SA Procédé de sécurisation de l'ecriture en mémoire contre des attaques par rayonnement ou autres
GB2442273A (en) * 2006-09-29 2008-04-02 Ibm Mechanism for allowing access to unsecured resources via a security engine using inverted security policies
EP2819057B1 (fr) * 2013-06-24 2017-08-09 Nxp B.V. Système de traitement de données, procédé d'initialisation d'un système de traitement de données et produit de programme informatique

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3916385A (en) * 1973-12-12 1975-10-28 Honeywell Inf Systems Ring checking hardware
JPS5917650A (ja) * 1982-07-22 1984-01-28 Fujitsu Ltd フアイル機密保護方式
JPS62242273A (ja) * 1986-04-14 1987-10-22 Nec Corp セキユリテイ管理方式
JPS6337446A (ja) * 1986-08-01 1988-02-18 Hitachi Ltd フアイルアクセス権限検査方式
US4926476A (en) * 1989-02-03 1990-05-15 Motorola, Inc. Method and apparatus for secure execution of untrusted software

Also Published As

Publication number Publication date
JPH0341535A (ja) 1991-02-22
CA2018319C (fr) 1997-01-07
DE69029880T2 (de) 1997-08-21
EP0407060A2 (fr) 1991-01-09
EP0407060B1 (fr) 1997-02-05
EP0407060A3 (en) 1991-12-27
DE69029880D1 (de) 1997-03-20

Similar Documents

Publication Publication Date Title
CA2018319A1 (fr) Methode pour assurer le secret et l'integrite des fichiers dans un systeme informatique
CA2025434A1 (fr) Methode de protection contre l'utilisation non autorisee d'un logiciel dans un reseau informatique
WO1999021094A3 (fr) Dispositif materiel de securite reconfigurable et procede de fonctionnement
HK1069655A1 (en) Tokenless identification system for authorization of electronic transactions and electronic transmissions
ES8602275A1 (es) Un metodo de verificar un numero de identificacion personal y comprobar una serie de numeros puestos en un medio de identificacion
EP0382468A3 (fr) Fonctions mot de passe à la mise sous tension pour systèmes d'ordinateurs
WO1998053434A3 (fr) Procede d'initialisation d'un systeme antivol pour vehicule
EP0276930A3 (fr) Système de verouillage électronique
WO1998048538A3 (fr) Procede pour la gestion de codes proteges a l'aide d'une identification biometrique
GB1456138A (en) Security devices and methods of operation thereof
CA2225001A1 (fr) Systeme d'identification de l'utilisateur d'une machine a affranchir
Schell et al. Integrity in trusted database systems.
WO1990012464A1 (fr) Procede et appareil de protection de materiaux sur des supports d'enregistrement
TW363184B (en) Storage media having electronic circuit and computer system including storage media
SE9202427L (sv) Sätt och anordning för förhindrande av obehörig åtkomst till datorsystem
Garvey et al. Multilevel data store design
Neagle Brazil & Italy Complete Talks On $1.5 Billion Cooperation Agreement
Bowden Managing to make a difference: a study of career diversity among men and women research scientists
GB2362246B (en) Computer system with checkpoint facility
Akinyele States Creation and Boundary Adjustments in Nigeria, 1900-1987: A Study in the Approach to the Problems of Ethnic Minority Groups in Nigeria
Parker Decision Variables in Production-distribution Systems for Clothing Manufacture
Hendricks A necessary revolution: the origins of the Kaiser Permanente Medical Care Program
Hall The Use of Computer Systems in the Personnel Function
Slater Logical Access Security
Harrison Pigeon-Holing Prospects: The Identification of Segment Predictors from Financial Services Consumer Behaviour

Legal Events

Date Code Title Description
EEER Examination request
MKEX Expiry