CN1605992A - User authority rapid access generation system in call control list and method thereof - Google Patents

User authority rapid access generation system in call control list and method thereof Download PDF

Info

Publication number
CN1605992A
CN1605992A CNA2003101117599A CN200310111759A CN1605992A CN 1605992 A CN1605992 A CN 1605992A CN A2003101117599 A CNA2003101117599 A CN A2003101117599A CN 200310111759 A CN200310111759 A CN 200310111759A CN 1605992 A CN1605992 A CN 1605992A
Authority
CN
China
Prior art keywords
setting
authority
value
user
user right
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2003101117599A
Other languages
Chinese (zh)
Other versions
CN100377110C (en
Inventor
吴政锰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hongfujin Precision Industry Shenzhen Co Ltd
Hon Hai Precision Industry Co Ltd
Original Assignee
Hongfujin Precision Industry Shenzhen Co Ltd
Hon Hai Precision Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hongfujin Precision Industry Shenzhen Co Ltd, Hon Hai Precision Industry Co Ltd filed Critical Hongfujin Precision Industry Shenzhen Co Ltd
Priority to CNB2003101117599A priority Critical patent/CN100377110C/en
Publication of CN1605992A publication Critical patent/CN1605992A/en
Application granted granted Critical
Publication of CN100377110C publication Critical patent/CN100377110C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Abstract

The invention discloses a user authority rapid access generation system in call control list and method thereof, when the user needs perform file operation, the system and method provided by the invention will seek a right setting value needed by the user from a configured first high speed buffer based on the predetermined procedure, if not available, then second high speed buffer is used for query. If the value cannot be found in the memory, the system will query the value upwards from layer to layer from the lower level catalog where the user file is stored.

Description

User right rapid access generation system and method in the Access Control List (ACL)
[technical field]
The present invention relates to the field of archives economy safety, user right rapid access generation system and method in particularly a kind of Access Control List (ACL).
[background technology]
In the document storage system of a NAS (Network Attached Storage) framework, the authority setting of user file is most important.The method that relates to the user file authority setting at present is a lot, but it is not a lot of relating to the method that the user file authority value of setting gets soon, for example China national Department of Intellectual Property is in disclosed " CN1395178A " number patent application case on February 5th, 2002, and name is called " file privilege limit initialization system and method ".This patent application case is the authority setting data of at least a portion of setting a file according to the contained user's recognition data of authority setting packet and user's permissions data; and utilize authority inspection module and authority setting module in the file privilege limit initialization system to realize above-mentioned functions, so that improve the efficient of user management file flow process and the security of file protection.Though the deficiency of technology that this patent application case discloses is that it has solved the authority setting problem of user file, do not have to solve how in Access Control List (ACL), to obtain the required authority value of setting of user fast.
For instance, the user can cause following action usually to the access of certain file: at first, check that whether this user has the authority of this user file of operation, if required authority is arranged, then allows the user that file is operated.Wherein the process of the authority value of setting inspection is: at first from this user file place upper directory, inquire about authority value of setting of this user file place lower directory one by one downwards, until inquiring this user file place catalogue.A weak point of this inquiry way is that high-speed cache can only keep in the last inquiry intermediate result at every turn, can not utilize the intermediate result of last query script, when similar inquiry takes place, can only inquire about again, repeats said process.Second weak point is to inquire about the required authority value of setting of certain user and need spends the more time, and search efficiency is lower.
[summary of the invention]
Deficiency at said method, first purpose of the present invention is to provide user right rapid access generation system in a kind of Access Control List (ACL), it can be provided with value information according to the authority that is temporary in first high-speed cache and second high-speed cache, obtain the authority of user's request fast, when the similar authority value of setting query actions, therefrom fast query and obtain the required authority value of setting of user is accelerated inquiry velocity.
Second purpose of the present invention is to provide in a kind of Access Control List (ACL) user right to get the generation method soon, when the advantage of this method is that it can be worked as the user do not find the requested permissions value of setting in first high-speed cache and second high-speed cache, from the file place lower directory that the user will visit, successively upwards inquire about its upper directory, up to obtaining required authority value of setting.
The invention provides user right rapid access generation system in a kind of Access Control List (ACL), it comprises one first high-speed cache, be that the network attached storage device carries out the internal memory of visiting at first when the user right value of setting is checked, be used to store a plurality of first information pieces, these a plurality of first information pieces are used to write down the last user right value of setting of visiting; One second high-speed cache, be that the network attached storage device is when the calling party authority value of setting is miss in first internal memory, the high-speed cache that begins to inquire about, be used to store a plurality of second message block, this a plurality of second message block system is used for the results of intermediate calculations of user right value of setting that record access crosses and the upper and lower relation of file directory; One authority enquiry module is used in first high-speed cache and second high-speed cache inquiring user authority value of setting, and generates a plurality of first information pieces and second chunk store in this first high-speed cache and second high-speed cache; One authority integrate module is used for according to different authorities value information being set current authority value of setting and the inherited rights value of setting is integrated with the accumulative total authority value of setting; One message block generation module is used to generate the first information piece and second message block, and it is stored into respectively in first high-speed cache and second high-speed cache.
The present invention also provides in a kind of Access Control List (ACL) user right to get the generation method soon, and it may further comprise the steps: set up a dummy argument node in the root directory of file system, this dummy argument node is the identifier of a virtual Access Control List (ACL); Add a first information piece in first high-speed cache, this first information piece system is used to write down the last user right value of setting of visiting; According to user identifier and current authority identifier, inquiry one accumulative total authority identifier and current authority value of setting in second high-speed cache; Judge whether to find required accumulative total authority identifier and current authority value of setting; If, then generate first information piece, if not, then carry out following step: the integrated results with current authority value of setting and the inherited rights value of setting replaces this inherited rights value of setting, and replace the authority identifier of inquiry last time with current authority identifier, restart to carry out above-mentioned steps; Judge according to the accumulative total authority value of setting whether user institute requested operation is allowed to.
[description of drawings]
Fig. 1 is the enforcement environment of user right rapid access generation system and method in the Access Control List (ACL) of the present invention.
Fig. 2 is the functional block diagram of user right rapid access generation system and method in the Access Control List (ACL) of the present invention.
Fig. 3 is that the authority of user right rapid access generation system and method in the Access Control List (ACL) of the present invention is integrated the computation rule table.
Fig. 4 is user right rapid access generation system and a method main flow chart in the Access Control List (ACL) of the present invention.
Fig. 5 is the inquiry second high-speed cache flow process figure of user right rapid access generation system and method in the Access Control List (ACL) of the present invention.
[embodiment]
Seeing also shown in Figure 1ly, is the enforcement environment of user right rapid access generation system and method in the Access Control List (ACL) of the present invention.This enforcement environment comprises network attached storage device 1, first high-speed cache 2, second high-speed cache 3, network 4 and a plurality of user terminal apparatus 5.Described network 4 can be intranet, wide area network or telephone network, is to be used to connect network attached storage device 1 and a plurality of user terminal apparatus 5.Built-in first high-speed cache 2 of network attached storage device and second high-speed cache 3.Described a plurality of user terminal apparatus 5 is to be used for user file is operated, this operation comprise read, write, delete, modification etc.This network attached storage device 1 is to be used to store a plurality of user files.
Seeing also shown in Figure 2ly, is the functional block diagram of user right rapid access generation system and method in the Access Control List (ACL) of the present invention.This functional block diagram comprises a network attached storage device 1, one first high-speed cache 2 and one second high-speed cache 3.Wherein network attached storage device 1 links separately respectively by bus and first high-speed cache 2 and second high-speed cache 3.This network attached storage device 1 comprises a directory management module 10, an authority computing module 11, an authority enquiry module 12, an authority integrate module 13 and a message block generation module 14.Wherein directory management module 10 is used for catalogue is read, writes, deletion, operations such as modification.Authority computing module 11 is used to calculate the current authority value of setting P CAuthority enquiry module 12 is used for from the authority value of setting P of first high-speed cache 2 and second high-speed cache, 3 inquiry current accessed objects CAuthority integrate module 13 is used for according to the first information piece 20 of first high-speed cache 2 and 3 storages of second high-speed cache and the inherited rights value of setting P that second message block 30 is integrated out active user institute access object fast IMessage block generation module 14 is used to generate the first information piece 20 that is stored in first high-speed cache 2 and second message block 30 of second high-speed cache 3.
First high-speed cache 2 is used for the intermediate result of storing queries process, and this intermediate result is stored in the mode of first information piece 20, and this first information piece is a lot of civilian numerical code, comprises user identifier U, current authority identifier I C, the inherited rights value of setting P I, altogether with<I C, U, P IExpression.Wherein user identifier U is the identifier of inspection user identity, current authority identifier I CBe an Access Control List (ACL) (Access Control List, ACL) code, this Access Control List (ACL) stores the access authority information of different user to current directory and current file, each Access Control List (ACL) stores 1024 authority informations, for example, the keeper is FC (control fully) to the authority of file " company information ", and general user's first is RO (read-only) to the authority of this document, general user's second is WO (only writing) to the authority of this document, this authority identifier I CSystem is used for discerning the authority information on current file or the catalogue, as long as the user does not change the authority value of setting on file or the catalogue, I CJust can not change.The inherited rights value of setting P IBe current directory authority value of setting of layer catalogue succession from it, described first high-speed cache 2 can only be kept in the last inquiry intermediate result at every turn.Second high-speed cache 3 is mainly used in the intermediate result of keeping in query script, and this intermediate result is stored in the mode of second message block 30, and this second message block is a lot of civilian numerical code, comprises user identifier U, accumulative total authority identifier I L, current authority identifier I C, the current authority value of setting P C, altogether with<U, I L, I C, P CExpression.Wherein add up authority identifier I LIt is the identifier of the authority information of last access file or catalogue.The current authority value of setting P CBe that the user is according to current authority identifier I CObtain behind the authority information of file or catalogue through calculating authority value of setting of gained.The common capacity of second high-speed cache is 4KB, can store 16 intermediate results at every turn.
Seeing also shown in Figure 3ly, is that the authority of user right rapid access generation system and method in the Access Control List (ACL) of the present invention is integrated the computation rule table.Classify the current authority value of setting P in the table as CWith the inherited rights value of setting P IThe merging rule, the concrete operation rule is: NA (can't access) has precedence over RO (read-only), WO (only writing), RW (readable writing) and FC (control fully), RO (read-only) is RW (readable writing) with the amalgamation result of WO (only writing), and FC (control fully) comprises RW (readable writing).In addition, directory management module 10 predetermined directory authority priority levels are that lower directory has precedence over upper directory, the promptly current authority value of setting P CHave precedence over the inherited rights value of setting P IWhen authority integrate module 13 carries out the integration of the authority value of setting, as long as it be NA (can't access) or FC (controlling fully) that above-mentioned authority is integrated the back result, authority enquiry module 12 just stops upper strata authority inquiry, thereby can determine whether user institute requested operation is allowed to.
Seeing also shown in Figure 4ly, is user right rapid access generation system and method main flow chart in the Access Control List (ACL) of the present invention.At first, flow process begins to carry out the authority of catalogue and checks (step S400), and authority enquiry module 12 is with message block<I L, I C, U, P LMode inquire about current authority identifier I CWhether (step S401) exists the inherited rights value of setting P of active user in first high-speed cache 2 I(step S402).If exist, the following judgement of flow performing is if exist active user's accumulative total authority identifier I in first high-speed cache 2 L, 13 the inherited rights value of setting P of authority integrate module with this user IWith the accumulative total authority value of setting P LIntegrate the back and replace the accumulative total authority value of setting P L, it is that authority integration computation rule table shown in Figure 3 carries out the integration of associated rights according to the present invention that authority is wherein integrated; If there is not active user's accumulative total authority identifier I in first high-speed cache 2 L, directly with the inherited rights value of setting P IReplace the accumulative total authority value of setting P L(step S403).Then, judge in second high-speed cache 3, whether there is current authority identifier I CThe current authority value of setting P C(step S404) then judges the accumulative total authority value of setting P of this user LWhether meet authority value of setting (step S405) that the user asks, if do not meet, the then operation of refusing user's request (step S406), otherwise, allow the user to carry out institute's requested operation (step S407).If authority enquiry module 12 does not find the inherited rights value of setting P of active user in step S402 I, further with second message block<U, I L, I C, P CMode in second high-speed cache 3, inquire about the current authority value of setting P of this user C(step S408), if find, flow process is directly carried out following step: if find active user's accumulative total authority identifier I L, 13 the current authority value of setting P of authority integrate module with this user CWith the accumulative total authority value of setting P LIntegrate the computation rule table according to authority shown in Figure 3 and integrate the back replacement accumulative total authority value of setting P L, otherwise, directly with the current authority value of setting P CReplace the accumulative total authority value of setting P L(step S410).If in step S408, do not find the current authority value of setting P C, then further calculate the current authority value of setting P of this user C(step S409) then continues execution in step S410, and then, authority computing module 11 sends inquiry, whether needs the inherited rights value of setting P I(step S411) be not if need this inherited rights value of setting P I, message block generation module 14 generates first information piece<I C, U, P IAnd it is joined in first high-speed cache 2 (step S413), flow process turns to step S404, carries out the loop flow process.If also need the authority data inherited through judging, then to generate second message block<U, I by message block generation module 14 L, I C, P CAnd it is joined in second high-speed cache 3 (step S412), and with current authority identifier I CReplace accumulative total authority identifier I L(step S414), so far, authority enquiry module 12 sends inquiry, current authority identifier I CWhether there is upper strata management and control catalogue (step S415),, then replaces current authority identifier I with upper strata control list information code if exist C(step S416), this upper strata control list information code are that the authority of default each layer catalogue of directory management module 10 is provided with the value information code, otherwise, replace current authority identifier I with the control list information code of dummy argument node C(step S417), the control list information code of this dummy argument node is the authority value of setting code of presetting, the default two types of users of dummy argument node wherein and the corresponding authority value of setting are set: the keeper has the complete control of user file, and the general user is readable to be write.
Seeing also shown in Figure 5ly, is the inquiry second high-speed cache flow process figure of user right rapid access generation system and method in the Access Control List (ACL) of the present invention.Flow process begins to carry out (step S5 1) from the main flow inlet point, with message block<I C, P IJoin (step S52) among the storehouse S, judge whether storehouse S is empty (step S53), if, then enter the loop flow process, restart to carry out (step S54) from the main flow inlet point.If storehouse S is not empty, then by taking out one group<I among the storehouse S L, P CAssembly (step S55), then, with<I L, U〉and in second high-speed cache 3, attempt finding out one group of second message block<U, I L, I C, P C, and from second high-speed cache, remove this second message block (step S56).If do not find this second message block<U, I L, I C, P C, flow process then directly forwards step S53 to and enters the loop flow process.If find this second message block<U, I L, I C, P C, then with message block<I C, U, Merge (P I, P C) join in first high-speed cache 2 (step S57) Merge (P wherein I, P C) be that the authority shown in Figure 3 according to the present invention integrated the computation rule table with the inherited rights value of setting P IWith the current authority value of setting P CIntegrate, integrated results replaces the inherited rights value of setting P IThen, flow process is sent inquiry, active user's accumulative total authority identifier I LWhether be effective control authority message code (step S58), if, general<I L, Merge (P I, P C) join (step S59) among the storehouse S, turn to step S56 place to begin to carry out the loop flow process.If through judging I LBe invalid control authority message code, flow process then directly turns to step S56 place beginning loop flow process.
The above only is preferred embodiment of the present invention, and has reached and used effect widely, and all other do not break away from the equalization of being finished under the disclosed spirit to be changed or modification, all should be included in the following claim scope.

Claims (10)

1. user right rapid access generation system in the Access Control List (ACL), be to be used for user right value of setting that the storage networking annex memory was inquired about, when realizing that identical authority value of setting is checked, can get this user right value of setting soon, this user right value of setting is the operating right of user terminal apparatus to file, this operation comprises to be read, write, deletes, revises, and it is characterized in that the user right rapid access generation system comprises in this Access Control List (ACL):
One first high-speed cache is that the network attached storage device carries out the internal memory of visiting at first when the user right value of setting is checked, is used to store a plurality of first information pieces, and this first information piece system is used to write down the last user right value of setting of visiting;
One second high-speed cache, be that the network attached storage device is when the calling party authority value of setting is miss in first internal memory, the high-speed cache that begins to inquire about, be used to store a plurality of second message block, this second message block system is used for the results of intermediate calculations of user right value of setting that record access crosses and the upper and lower relation of file directory;
One authority enquiry module is used in first high-speed cache and second high-speed cache inquiring user authority value of setting, and generates a plurality of first information pieces and second chunk store in this first high-speed cache and second high-speed cache;
One authority integrate module is used for according to different authority values of setting current authority value of setting and the inherited rights value of setting being integrated with the accumulative total authority value of setting;
One message block generation module is used to generate the first information piece and second message block, and it is stored into respectively in first high-speed cache and second high-speed cache.
2. user right rapid access generation system in the Access Control List (ACL) as claimed in claim 1 is characterized in that wherein said first information piece comprises user identifier, current authority identifier, the inherited rights value of setting.
3. user right rapid access generation system in the Access Control List (ACL) as claimed in claim 1 is characterized in that wherein said second message block comprises user identifier, current authority identifier, accumulative total authority identifier, current authority value of setting.
4. user right rapid access generation system in the Access Control List (ACL) as claimed in claim 1 is characterized in that the common capacity of wherein said second high-speed cache is 4KB.
5. user right rapid access generation system in the Access Control List (ACL) as claimed in claim 1 is characterized in that wherein said second high-speed cache can store nearly 16 intermediate queries results at every turn.
6. user right rapid access generation system in the Access Control List (ACL) as claimed in claim 1 is characterized in that it also comprises a directory management module, is used for the catalogue relation that is stored in network attached storage device file is managed.
7. user right rapid access generation system in the Access Control List (ACL) as claimed in claim 1 is characterized in that it also comprises an authority computing module, is used for calculating the user right value of setting according to an authority computation rule table.
8. user right is got the generation method soon in the Access Control List (ACL), be used for user right value of setting that the storage networking annex memory was inquired about, when realizing that identical authority value of setting is checked, can get this user right value of setting soon, this user right value of setting is user terminal apparatus operation permission value of setting to file, this operation comprises to be read, write, deletes, revises, and user right is got the generation method soon and comprised the steps: in this Access Control List (ACL)
Set up a dummy argument node in the root directory of file system, this dummy argument node is a virtual authority identifier;
Add in a first information piece to one first high-speed cache, this first information piece is used to write down the last user right value of setting of visiting;
According to user identifier and current authority identifier, inquiry one accumulative total authority identifier and current authority value of setting in one second high-speed cache;
Judge whether to find required accumulative total authority identifier and current authority value of setting; If, then generate first information piece, if not, then carry out following step;
Integrated results with current authority value of setting and the inherited rights value of setting replaces this succession
The authority value of setting, and replace the authority identifier of inquiry last time with current authority identifier,
Restart to carry out above-mentioned steps;
Judge according to the accumulative total authority value of setting whether user institute requested operation is allowed to.
9. user right is got the generation method soon in the Access Control List (ACL) as claimed in claim 8, it is characterized in that integration wherein is to integrate the computation rule table according to a default authority to carry out the authority integration.
10. user right is got the generation method soon in the Access Control List (ACL) as claimed in claim 8, it is characterized in that wherein default two types of users of dummy argument node and corresponding authority setting, and the keeper has the complete control of user file, and the general user is readable to be write.
CNB2003101117599A 2003-10-10 2003-10-10 User authority rapid access generation system in call control list and method thereof Expired - Fee Related CN100377110C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2003101117599A CN100377110C (en) 2003-10-10 2003-10-10 User authority rapid access generation system in call control list and method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2003101117599A CN100377110C (en) 2003-10-10 2003-10-10 User authority rapid access generation system in call control list and method thereof

Publications (2)

Publication Number Publication Date
CN1605992A true CN1605992A (en) 2005-04-13
CN100377110C CN100377110C (en) 2008-03-26

Family

ID=34759445

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2003101117599A Expired - Fee Related CN100377110C (en) 2003-10-10 2003-10-10 User authority rapid access generation system in call control list and method thereof

Country Status (1)

Country Link
CN (1) CN100377110C (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100465967C (en) * 2007-08-20 2009-03-04 华为技术有限公司 Inquiry result processing method and device
CN101923620A (en) * 2009-06-17 2010-12-22 富士施乐株式会社 Computer readable medium, method for controlling execution of processing, and information processing apparatus
CN102456011A (en) * 2010-10-21 2012-05-16 镇江金软计算机科技有限责任公司 SaaS (Software as a Service) application software performance optimization method based on cache technology
CN102612694A (en) * 2009-11-25 2012-07-25 国际商业机器公司 Extensible access control list framework
CN102696040A (en) * 2010-03-29 2012-09-26 雅马哈株式会社 Relay device and file sharing method
CN106326766A (en) * 2016-08-16 2017-01-11 陈亮 HBase data reading control method
CN103078845B (en) * 2012-12-19 2017-05-10 华为技术有限公司 Method for calibrating access control list (ACL), and shared storage system
CN106776706A (en) * 2016-11-16 2017-05-31 航天恒星科技有限公司 Method for managing user right and device based on caching
CN107480537A (en) * 2017-06-28 2017-12-15 北京小度信息科技有限公司 Authority the Resources list automatic generation method and device
WO2019000979A1 (en) * 2017-06-30 2019-01-03 华为技术有限公司 File system access rights configuration method and device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5956715A (en) * 1994-12-13 1999-09-21 Microsoft Corporation Method and system for controlling user access to a resource in a networked computing environment
US6622220B2 (en) * 2001-03-15 2003-09-16 Hewlett-Packard Development Company, L.P. Security-enhanced network attached storage device
CN1182466C (en) * 2001-07-09 2004-12-29 大买家科技股份有限公司 File usage authority defining system and method
CN1437116A (en) * 2002-02-07 2003-08-20 顾士平 Fixed disk, disk array, electronic disk, iSCSI, SAN and NAS control method

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100465967C (en) * 2007-08-20 2009-03-04 华为技术有限公司 Inquiry result processing method and device
CN101923620B (en) * 2009-06-17 2015-08-19 富士施乐株式会社 The method that the execution of process is controlled and signal conditioning package
CN101923620A (en) * 2009-06-17 2010-12-22 富士施乐株式会社 Computer readable medium, method for controlling execution of processing, and information processing apparatus
CN102612694A (en) * 2009-11-25 2012-07-25 国际商业机器公司 Extensible access control list framework
CN102696040B (en) * 2010-03-29 2015-11-25 雅马哈株式会社 Relay and file sharing method
CN102696040A (en) * 2010-03-29 2012-09-26 雅马哈株式会社 Relay device and file sharing method
CN102456011A (en) * 2010-10-21 2012-05-16 镇江金软计算机科技有限责任公司 SaaS (Software as a Service) application software performance optimization method based on cache technology
CN103078845B (en) * 2012-12-19 2017-05-10 华为技术有限公司 Method for calibrating access control list (ACL), and shared storage system
CN106326766A (en) * 2016-08-16 2017-01-11 陈亮 HBase data reading control method
CN106326766B (en) * 2016-08-16 2019-04-09 陈亮 A kind of HBase reading data control method
CN106776706A (en) * 2016-11-16 2017-05-31 航天恒星科技有限公司 Method for managing user right and device based on caching
CN107480537A (en) * 2017-06-28 2017-12-15 北京小度信息科技有限公司 Authority the Resources list automatic generation method and device
WO2019000979A1 (en) * 2017-06-30 2019-01-03 华为技术有限公司 File system access rights configuration method and device
US11238175B2 (en) 2017-06-30 2022-02-01 Huawei Technologies Co., Ltd. File system permission setting method and apparatus

Also Published As

Publication number Publication date
CN100377110C (en) 2008-03-26

Similar Documents

Publication Publication Date Title
US20220075767A1 (en) System and method for clustering distributed hash table entries
US7783737B2 (en) System and method for managing supply of digital content
US8069269B2 (en) Methods and apparatus for accessing content in a virtual pool on a content addressable storage system
CN100456311C (en) System and method for actualizing content-based file system security
CN103150394B (en) Distributed file system metadata management method facing to high-performance calculation
US6633872B2 (en) Extendible access control for lightweight directory access protocol
KR101265815B1 (en) System and methods providing enhanced security model
US20200250333A1 (en) Data management system and data management method
US20100262624A1 (en) Discovery of inaccessible computer resources
US9430665B2 (en) Dynamic authorization to features and data in JAVA-based enterprise applications
US9286307B2 (en) Document management apparatus improved in efficiency of deletion of files, method of controlling the same, and storage medium
CN106537345A (en) Precisely tracking memory usage in multi-process computing environment
CN106682186A (en) File access control list (ACL) management method and related device and system
CN1629826A (en) Method and apparatus for data retention in a storage system
US20110218999A1 (en) System, method and program for information processing
CN100370441C (en) Method for traversing licensing rights in access control list
CN105051749A (en) Policy based data protection
CN106021445A (en) Cached data loading method and apparatus
CN107784108A (en) A kind of data storage and management method, device and equipment
CN105681295B (en) It is associated with big data sharing method and device
CN1605992A (en) User authority rapid access generation system in call control list and method thereof
CN106372266A (en) Cache and accessing method of cloud operation system based on aspects and configuration documents
US6055534A (en) File management system and file management method
US7539813B1 (en) Methods and apparatus for segregating a content addressable computer system
CN107196947A (en) A kind of accesses control list method to set up and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20080326

Termination date: 20141010

EXPY Termination of patent right or utility model