CA2018319A1 - Methode pour assurer le secret et l'integrite des fichiers dans un systeme informatique - Google Patents
Methode pour assurer le secret et l'integrite des fichiers dans un systeme informatiqueInfo
- Publication number
- CA2018319A1 CA2018319A1 CA2018319A CA2018319A CA2018319A1 CA 2018319 A1 CA2018319 A1 CA 2018319A1 CA 2018319 A CA2018319 A CA 2018319A CA 2018319 A CA2018319 A CA 2018319A CA 2018319 A1 CA2018319 A1 CA 2018319A1
- Authority
- CA
- Canada
- Prior art keywords
- file
- secrecy
- security
- computer system
- security label
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2145—Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US37438089A | 1989-06-30 | 1989-06-30 | |
US374,380 | 1989-06-30 |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2018319A1 true CA2018319A1 (fr) | 1990-12-31 |
CA2018319C CA2018319C (fr) | 1997-01-07 |
Family
ID=23476563
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002018319A Expired - Lifetime CA2018319C (fr) | 1989-06-30 | 1990-06-05 | Methode pour assurer le secret et l'integrite des fichiers dans un systeme informatique |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP0407060B1 (fr) |
JP (1) | JPH0341535A (fr) |
CA (1) | CA2018319C (fr) |
DE (1) | DE69029880T2 (fr) |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5574912A (en) * | 1990-05-04 | 1996-11-12 | Digital Equipment Corporation | Lattice scheduler method for reducing the impact of covert-channel countermeasures |
US5414844A (en) * | 1990-05-24 | 1995-05-09 | International Business Machines Corporation | Method and system for controlling public access to a plurality of data objects within a data processing system |
US5276901A (en) * | 1991-12-16 | 1994-01-04 | International Business Machines Corporation | System for controlling group access to objects using group access control folder and group identification as individual user |
US5657470A (en) * | 1994-11-09 | 1997-08-12 | Ybm Technologies, Inc. | Personal computer hard disk protection system |
US5586301A (en) * | 1994-11-09 | 1996-12-17 | Ybm Technologies, Inc. | Personal computer hard disk protection system |
US5819091A (en) * | 1994-12-22 | 1998-10-06 | Arendt; James Wendell | User level control of degree of client-side processing |
US7406603B1 (en) | 1999-08-31 | 2008-07-29 | Intertrust Technologies Corp. | Data protection systems and methods |
GB9923340D0 (en) * | 1999-10-04 | 1999-12-08 | Secr Defence | Improvements relating to security |
DE10008153A1 (de) * | 2000-02-22 | 2001-06-21 | Primasoft Gmbh | Verfahren zur Sicherung von in einer digitalen Verarbeitungseinheit abgelegten Daten gegen unbefugten Zugriff |
DE10113828A1 (de) * | 2001-03-21 | 2002-09-26 | Infineon Technologies Ag | Prozessor zum sicheren Verarbeiten von Daten unter Verwendung einer Datensicherheitsmarke und/oder von Befehlen unter Verwendung einer Befehlssicherheitsmarke |
EP1698958A1 (fr) * | 2005-02-25 | 2006-09-06 | Axalto SA | Procédé de sécurisation de l'ecriture en mémoire contre des attaques par rayonnement ou autres |
GB2442273A (en) * | 2006-09-29 | 2008-04-02 | Ibm | Mechanism for allowing access to unsecured resources via a security engine using inverted security policies |
EP2819057B1 (fr) * | 2013-06-24 | 2017-08-09 | Nxp B.V. | Système de traitement de données, procédé d'initialisation d'un système de traitement de données et produit de programme informatique |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3916385A (en) * | 1973-12-12 | 1975-10-28 | Honeywell Inf Systems | Ring checking hardware |
JPS5917650A (ja) * | 1982-07-22 | 1984-01-28 | Fujitsu Ltd | フアイル機密保護方式 |
JPS62242273A (ja) * | 1986-04-14 | 1987-10-22 | Nec Corp | セキユリテイ管理方式 |
JPS6337446A (ja) * | 1986-08-01 | 1988-02-18 | Hitachi Ltd | フアイルアクセス権限検査方式 |
US4926476A (en) * | 1989-02-03 | 1990-05-15 | Motorola, Inc. | Method and apparatus for secure execution of untrusted software |
-
1990
- 1990-06-05 CA CA002018319A patent/CA2018319C/fr not_active Expired - Lifetime
- 1990-06-20 DE DE69029880T patent/DE69029880T2/de not_active Expired - Lifetime
- 1990-06-20 EP EP90306750A patent/EP0407060B1/fr not_active Expired - Lifetime
- 1990-06-29 JP JP2170411A patent/JPH0341535A/ja active Pending
Also Published As
Publication number | Publication date |
---|---|
DE69029880T2 (de) | 1997-08-21 |
DE69029880D1 (de) | 1997-03-20 |
JPH0341535A (ja) | 1991-02-22 |
EP0407060B1 (fr) | 1997-02-05 |
EP0407060A2 (fr) | 1991-01-09 |
EP0407060A3 (en) | 1991-12-27 |
CA2018319C (fr) | 1997-01-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2018319A1 (fr) | Methode pour assurer le secret et l'integrite des fichiers dans un systeme informatique | |
CA2118878A1 (fr) | Systeme et methode de reconnaissance de locuteurs | |
AU5922696A (en) | Tokenless identification system for authorization of electronic transactions and electronic transmissions | |
EP0382468A3 (fr) | Fonctions mot de passe à la mise sous tension pour systèmes d'ordinateurs | |
WO1998053434A3 (fr) | Procede d'initialisation d'un systeme antivol pour vehicule | |
EP0276930A3 (fr) | Système de verouillage électronique | |
WO1998048538A3 (fr) | Procede pour la gestion de codes proteges a l'aide d'une identification biometrique | |
EP0805607A3 (fr) | Méthode d'accès d'au moins une partie des données d'une carte à microprocesseur | |
GB1456138A (en) | Security devices and methods of operation thereof | |
CA2225001A1 (fr) | Systeme d'identification de l'utilisateur d'une machine a affranchir | |
WO1990012464A1 (fr) | Procede et appareil de protection de materiaux sur des supports d'enregistrement | |
TW363184B (en) | Storage media having electronic circuit and computer system including storage media | |
SE9202427D0 (sv) | Saett och anordning foer foerhindrande av obehoerig aatkomst till datorsystem | |
Garvey et al. | Multilevel data store design | |
Neagle | Brazil & Italy Complete Talks On $1.5 Billion Cooperation Agreement | |
Akinyele | States Creation and Boundary Adjustments in Nigeria, 1900-1987: A Study in the Approach to the Problems of Ethnic Minority Groups in Nigeria | |
Bowden | Managing to make a difference: a study of career diversity among men and women research scientists | |
GB2362246B (en) | Computer system with checkpoint facility | |
Parker | Decision Variables in Production-distribution Systems for Clothing Manufacture | |
Slater | Logical Access Security | |
Labaree | 'Finding'troubadour song: Melodic variability and melodic idiom in three monophonic traditions | |
Oliver | Principles for Reorganization of the Seventh-day Adventist Administrative Structure, 1888-1903 Implications for an International Church | |
McDermott | Prolepsis on the problem of Trojan-horse based integrity attacks (position paper) | |
Goldberg et al. | Independent revocation of access rights in database management systems | |
Fano | The Computer Utility and the Community |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKEX | Expiry |