CN1605992A - User authority rapid access generation system in call control list and method thereof - Google Patents
User authority rapid access generation system in call control list and method thereof Download PDFInfo
- Publication number
- CN1605992A CN1605992A CNA2003101117599A CN200310111759A CN1605992A CN 1605992 A CN1605992 A CN 1605992A CN A2003101117599 A CNA2003101117599 A CN A2003101117599A CN 200310111759 A CN200310111759 A CN 200310111759A CN 1605992 A CN1605992 A CN 1605992A
- Authority
- CN
- China
- Prior art keywords
- setting
- authority
- value
- user
- user right
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Abstract
The invention discloses a user authority rapid access generation system in call control list and method thereof, when the user needs perform file operation, the system and method provided by the invention will seek a right setting value needed by the user from a configured first high speed buffer based on the predetermined procedure, if not available, then second high speed buffer is used for query. If the value cannot be found in the memory, the system will query the value upwards from layer to layer from the lower level catalog where the user file is stored.
Description
[technical field]
The present invention relates to the field of archives economy safety, user right rapid access generation system and method in particularly a kind of Access Control List (ACL).
[background technology]
In the document storage system of a NAS (Network Attached Storage) framework, the authority setting of user file is most important.The method that relates to the user file authority setting at present is a lot, but it is not a lot of relating to the method that the user file authority value of setting gets soon, for example China national Department of Intellectual Property is in disclosed " CN1395178A " number patent application case on February 5th, 2002, and name is called " file privilege limit initialization system and method ".This patent application case is the authority setting data of at least a portion of setting a file according to the contained user's recognition data of authority setting packet and user's permissions data; and utilize authority inspection module and authority setting module in the file privilege limit initialization system to realize above-mentioned functions, so that improve the efficient of user management file flow process and the security of file protection.Though the deficiency of technology that this patent application case discloses is that it has solved the authority setting problem of user file, do not have to solve how in Access Control List (ACL), to obtain the required authority value of setting of user fast.
For instance, the user can cause following action usually to the access of certain file: at first, check that whether this user has the authority of this user file of operation, if required authority is arranged, then allows the user that file is operated.Wherein the process of the authority value of setting inspection is: at first from this user file place upper directory, inquire about authority value of setting of this user file place lower directory one by one downwards, until inquiring this user file place catalogue.A weak point of this inquiry way is that high-speed cache can only keep in the last inquiry intermediate result at every turn, can not utilize the intermediate result of last query script, when similar inquiry takes place, can only inquire about again, repeats said process.Second weak point is to inquire about the required authority value of setting of certain user and need spends the more time, and search efficiency is lower.
[summary of the invention]
Deficiency at said method, first purpose of the present invention is to provide user right rapid access generation system in a kind of Access Control List (ACL), it can be provided with value information according to the authority that is temporary in first high-speed cache and second high-speed cache, obtain the authority of user's request fast, when the similar authority value of setting query actions, therefrom fast query and obtain the required authority value of setting of user is accelerated inquiry velocity.
Second purpose of the present invention is to provide in a kind of Access Control List (ACL) user right to get the generation method soon, when the advantage of this method is that it can be worked as the user do not find the requested permissions value of setting in first high-speed cache and second high-speed cache, from the file place lower directory that the user will visit, successively upwards inquire about its upper directory, up to obtaining required authority value of setting.
The invention provides user right rapid access generation system in a kind of Access Control List (ACL), it comprises one first high-speed cache, be that the network attached storage device carries out the internal memory of visiting at first when the user right value of setting is checked, be used to store a plurality of first information pieces, these a plurality of first information pieces are used to write down the last user right value of setting of visiting; One second high-speed cache, be that the network attached storage device is when the calling party authority value of setting is miss in first internal memory, the high-speed cache that begins to inquire about, be used to store a plurality of second message block, this a plurality of second message block system is used for the results of intermediate calculations of user right value of setting that record access crosses and the upper and lower relation of file directory; One authority enquiry module is used in first high-speed cache and second high-speed cache inquiring user authority value of setting, and generates a plurality of first information pieces and second chunk store in this first high-speed cache and second high-speed cache; One authority integrate module is used for according to different authorities value information being set current authority value of setting and the inherited rights value of setting is integrated with the accumulative total authority value of setting; One message block generation module is used to generate the first information piece and second message block, and it is stored into respectively in first high-speed cache and second high-speed cache.
The present invention also provides in a kind of Access Control List (ACL) user right to get the generation method soon, and it may further comprise the steps: set up a dummy argument node in the root directory of file system, this dummy argument node is the identifier of a virtual Access Control List (ACL); Add a first information piece in first high-speed cache, this first information piece system is used to write down the last user right value of setting of visiting; According to user identifier and current authority identifier, inquiry one accumulative total authority identifier and current authority value of setting in second high-speed cache; Judge whether to find required accumulative total authority identifier and current authority value of setting; If, then generate first information piece, if not, then carry out following step: the integrated results with current authority value of setting and the inherited rights value of setting replaces this inherited rights value of setting, and replace the authority identifier of inquiry last time with current authority identifier, restart to carry out above-mentioned steps; Judge according to the accumulative total authority value of setting whether user institute requested operation is allowed to.
[description of drawings]
Fig. 1 is the enforcement environment of user right rapid access generation system and method in the Access Control List (ACL) of the present invention.
Fig. 2 is the functional block diagram of user right rapid access generation system and method in the Access Control List (ACL) of the present invention.
Fig. 3 is that the authority of user right rapid access generation system and method in the Access Control List (ACL) of the present invention is integrated the computation rule table.
Fig. 4 is user right rapid access generation system and a method main flow chart in the Access Control List (ACL) of the present invention.
Fig. 5 is the inquiry second high-speed cache flow process figure of user right rapid access generation system and method in the Access Control List (ACL) of the present invention.
[embodiment]
Seeing also shown in Figure 1ly, is the enforcement environment of user right rapid access generation system and method in the Access Control List (ACL) of the present invention.This enforcement environment comprises network attached storage device 1, first high-speed cache 2, second high-speed cache 3, network 4 and a plurality of user terminal apparatus 5.Described network 4 can be intranet, wide area network or telephone network, is to be used to connect network attached storage device 1 and a plurality of user terminal apparatus 5.Built-in first high-speed cache 2 of network attached storage device and second high-speed cache 3.Described a plurality of user terminal apparatus 5 is to be used for user file is operated, this operation comprise read, write, delete, modification etc.This network attached storage device 1 is to be used to store a plurality of user files.
Seeing also shown in Figure 2ly, is the functional block diagram of user right rapid access generation system and method in the Access Control List (ACL) of the present invention.This functional block diagram comprises a network attached storage device 1, one first high-speed cache 2 and one second high-speed cache 3.Wherein network attached storage device 1 links separately respectively by bus and first high-speed cache 2 and second high-speed cache 3.This network attached storage device 1 comprises a directory management module 10, an authority computing module 11, an authority enquiry module 12, an authority integrate module 13 and a message block generation module 14.Wherein directory management module 10 is used for catalogue is read, writes, deletion, operations such as modification.Authority computing module 11 is used to calculate the current authority value of setting P
CAuthority enquiry module 12 is used for from the authority value of setting P of first high-speed cache 2 and second high-speed cache, 3 inquiry current accessed objects
CAuthority integrate module 13 is used for according to the first information piece 20 of first high-speed cache 2 and 3 storages of second high-speed cache and the inherited rights value of setting P that second message block 30 is integrated out active user institute access object fast
IMessage block generation module 14 is used to generate the first information piece 20 that is stored in first high-speed cache 2 and second message block 30 of second high-speed cache 3.
First high-speed cache 2 is used for the intermediate result of storing queries process, and this intermediate result is stored in the mode of first information piece 20, and this first information piece is a lot of civilian numerical code, comprises user identifier U, current authority identifier I
C, the inherited rights value of setting P
I, altogether with<I
C, U, P
IExpression.Wherein user identifier U is the identifier of inspection user identity, current authority identifier I
CBe an Access Control List (ACL) (Access Control List, ACL) code, this Access Control List (ACL) stores the access authority information of different user to current directory and current file, each Access Control List (ACL) stores 1024 authority informations, for example, the keeper is FC (control fully) to the authority of file " company information ", and general user's first is RO (read-only) to the authority of this document, general user's second is WO (only writing) to the authority of this document, this authority identifier I
CSystem is used for discerning the authority information on current file or the catalogue, as long as the user does not change the authority value of setting on file or the catalogue, I
CJust can not change.The inherited rights value of setting P
IBe current directory authority value of setting of layer catalogue succession from it, described first high-speed cache 2 can only be kept in the last inquiry intermediate result at every turn.Second high-speed cache 3 is mainly used in the intermediate result of keeping in query script, and this intermediate result is stored in the mode of second message block 30, and this second message block is a lot of civilian numerical code, comprises user identifier U, accumulative total authority identifier I
L, current authority identifier I
C, the current authority value of setting P
C, altogether with<U, I
L, I
C, P
CExpression.Wherein add up authority identifier I
LIt is the identifier of the authority information of last access file or catalogue.The current authority value of setting P
CBe that the user is according to current authority identifier I
CObtain behind the authority information of file or catalogue through calculating authority value of setting of gained.The common capacity of second high-speed cache is 4KB, can store 16 intermediate results at every turn.
Seeing also shown in Figure 3ly, is that the authority of user right rapid access generation system and method in the Access Control List (ACL) of the present invention is integrated the computation rule table.Classify the current authority value of setting P in the table as
CWith the inherited rights value of setting P
IThe merging rule, the concrete operation rule is: NA (can't access) has precedence over RO (read-only), WO (only writing), RW (readable writing) and FC (control fully), RO (read-only) is RW (readable writing) with the amalgamation result of WO (only writing), and FC (control fully) comprises RW (readable writing).In addition, directory management module 10 predetermined directory authority priority levels are that lower directory has precedence over upper directory, the promptly current authority value of setting P
CHave precedence over the inherited rights value of setting P
IWhen authority integrate module 13 carries out the integration of the authority value of setting, as long as it be NA (can't access) or FC (controlling fully) that above-mentioned authority is integrated the back result, authority enquiry module 12 just stops upper strata authority inquiry, thereby can determine whether user institute requested operation is allowed to.
Seeing also shown in Figure 4ly, is user right rapid access generation system and method main flow chart in the Access Control List (ACL) of the present invention.At first, flow process begins to carry out the authority of catalogue and checks (step S400), and authority enquiry module 12 is with message block<I
L, I
C, U, P
LMode inquire about current authority identifier I
CWhether (step S401) exists the inherited rights value of setting P of active user in first high-speed cache 2
I(step S402).If exist, the following judgement of flow performing is if exist active user's accumulative total authority identifier I in first high-speed cache 2
L, 13 the inherited rights value of setting P of authority integrate module with this user
IWith the accumulative total authority value of setting P
LIntegrate the back and replace the accumulative total authority value of setting P
L, it is that authority integration computation rule table shown in Figure 3 carries out the integration of associated rights according to the present invention that authority is wherein integrated; If there is not active user's accumulative total authority identifier I in first high-speed cache 2
L, directly with the inherited rights value of setting P
IReplace the accumulative total authority value of setting P
L(step S403).Then, judge in second high-speed cache 3, whether there is current authority identifier I
CThe current authority value of setting P
C(step S404) then judges the accumulative total authority value of setting P of this user
LWhether meet authority value of setting (step S405) that the user asks, if do not meet, the then operation of refusing user's request (step S406), otherwise, allow the user to carry out institute's requested operation (step S407).If authority enquiry module 12 does not find the inherited rights value of setting P of active user in step S402
I, further with second message block<U, I
L, I
C, P
CMode in second high-speed cache 3, inquire about the current authority value of setting P of this user
C(step S408), if find, flow process is directly carried out following step: if find active user's accumulative total authority identifier I
L, 13 the current authority value of setting P of authority integrate module with this user
CWith the accumulative total authority value of setting P
LIntegrate the computation rule table according to authority shown in Figure 3 and integrate the back replacement accumulative total authority value of setting P
L, otherwise, directly with the current authority value of setting P
CReplace the accumulative total authority value of setting P
L(step S410).If in step S408, do not find the current authority value of setting P
C, then further calculate the current authority value of setting P of this user
C(step S409) then continues execution in step S410, and then, authority computing module 11 sends inquiry, whether needs the inherited rights value of setting P
I(step S411) be not if need this inherited rights value of setting P
I, message block generation module 14 generates first information piece<I
C, U, P
IAnd it is joined in first high-speed cache 2 (step S413), flow process turns to step S404, carries out the loop flow process.If also need the authority data inherited through judging, then to generate second message block<U, I by message block generation module 14
L, I
C, P
CAnd it is joined in second high-speed cache 3 (step S412), and with current authority identifier I
CReplace accumulative total authority identifier I
L(step S414), so far, authority enquiry module 12 sends inquiry, current authority identifier I
CWhether there is upper strata management and control catalogue (step S415),, then replaces current authority identifier I with upper strata control list information code if exist
C(step S416), this upper strata control list information code are that the authority of default each layer catalogue of directory management module 10 is provided with the value information code, otherwise, replace current authority identifier I with the control list information code of dummy argument node
C(step S417), the control list information code of this dummy argument node is the authority value of setting code of presetting, the default two types of users of dummy argument node wherein and the corresponding authority value of setting are set: the keeper has the complete control of user file, and the general user is readable to be write.
Seeing also shown in Figure 5ly, is the inquiry second high-speed cache flow process figure of user right rapid access generation system and method in the Access Control List (ACL) of the present invention.Flow process begins to carry out (step S5 1) from the main flow inlet point, with message block<I
C, P
IJoin (step S52) among the storehouse S, judge whether storehouse S is empty (step S53), if, then enter the loop flow process, restart to carry out (step S54) from the main flow inlet point.If storehouse S is not empty, then by taking out one group<I among the storehouse S
L, P
CAssembly (step S55), then, with<I
L, U〉and in second high-speed cache 3, attempt finding out one group of second message block<U, I
L, I
C, P
C, and from second high-speed cache, remove this second message block (step S56).If do not find this second message block<U, I
L, I
C, P
C, flow process then directly forwards step S53 to and enters the loop flow process.If find this second message block<U, I
L, I
C, P
C, then with message block<I
C, U, Merge (P
I, P
C) join in first high-speed cache 2 (step S57) Merge (P wherein
I, P
C) be that the authority shown in Figure 3 according to the present invention integrated the computation rule table with the inherited rights value of setting P
IWith the current authority value of setting P
CIntegrate, integrated results replaces the inherited rights value of setting P
IThen, flow process is sent inquiry, active user's accumulative total authority identifier I
LWhether be effective control authority message code (step S58), if, general<I
L, Merge (P
I, P
C) join (step S59) among the storehouse S, turn to step S56 place to begin to carry out the loop flow process.If through judging I
LBe invalid control authority message code, flow process then directly turns to step S56 place beginning loop flow process.
The above only is preferred embodiment of the present invention, and has reached and used effect widely, and all other do not break away from the equalization of being finished under the disclosed spirit to be changed or modification, all should be included in the following claim scope.
Claims (10)
1. user right rapid access generation system in the Access Control List (ACL), be to be used for user right value of setting that the storage networking annex memory was inquired about, when realizing that identical authority value of setting is checked, can get this user right value of setting soon, this user right value of setting is the operating right of user terminal apparatus to file, this operation comprises to be read, write, deletes, revises, and it is characterized in that the user right rapid access generation system comprises in this Access Control List (ACL):
One first high-speed cache is that the network attached storage device carries out the internal memory of visiting at first when the user right value of setting is checked, is used to store a plurality of first information pieces, and this first information piece system is used to write down the last user right value of setting of visiting;
One second high-speed cache, be that the network attached storage device is when the calling party authority value of setting is miss in first internal memory, the high-speed cache that begins to inquire about, be used to store a plurality of second message block, this second message block system is used for the results of intermediate calculations of user right value of setting that record access crosses and the upper and lower relation of file directory;
One authority enquiry module is used in first high-speed cache and second high-speed cache inquiring user authority value of setting, and generates a plurality of first information pieces and second chunk store in this first high-speed cache and second high-speed cache;
One authority integrate module is used for according to different authority values of setting current authority value of setting and the inherited rights value of setting being integrated with the accumulative total authority value of setting;
One message block generation module is used to generate the first information piece and second message block, and it is stored into respectively in first high-speed cache and second high-speed cache.
2. user right rapid access generation system in the Access Control List (ACL) as claimed in claim 1 is characterized in that wherein said first information piece comprises user identifier, current authority identifier, the inherited rights value of setting.
3. user right rapid access generation system in the Access Control List (ACL) as claimed in claim 1 is characterized in that wherein said second message block comprises user identifier, current authority identifier, accumulative total authority identifier, current authority value of setting.
4. user right rapid access generation system in the Access Control List (ACL) as claimed in claim 1 is characterized in that the common capacity of wherein said second high-speed cache is 4KB.
5. user right rapid access generation system in the Access Control List (ACL) as claimed in claim 1 is characterized in that wherein said second high-speed cache can store nearly 16 intermediate queries results at every turn.
6. user right rapid access generation system in the Access Control List (ACL) as claimed in claim 1 is characterized in that it also comprises a directory management module, is used for the catalogue relation that is stored in network attached storage device file is managed.
7. user right rapid access generation system in the Access Control List (ACL) as claimed in claim 1 is characterized in that it also comprises an authority computing module, is used for calculating the user right value of setting according to an authority computation rule table.
8. user right is got the generation method soon in the Access Control List (ACL), be used for user right value of setting that the storage networking annex memory was inquired about, when realizing that identical authority value of setting is checked, can get this user right value of setting soon, this user right value of setting is user terminal apparatus operation permission value of setting to file, this operation comprises to be read, write, deletes, revises, and user right is got the generation method soon and comprised the steps: in this Access Control List (ACL)
Set up a dummy argument node in the root directory of file system, this dummy argument node is a virtual authority identifier;
Add in a first information piece to one first high-speed cache, this first information piece is used to write down the last user right value of setting of visiting;
According to user identifier and current authority identifier, inquiry one accumulative total authority identifier and current authority value of setting in one second high-speed cache;
Judge whether to find required accumulative total authority identifier and current authority value of setting; If, then generate first information piece, if not, then carry out following step;
Integrated results with current authority value of setting and the inherited rights value of setting replaces this succession
The authority value of setting, and replace the authority identifier of inquiry last time with current authority identifier,
Restart to carry out above-mentioned steps;
Judge according to the accumulative total authority value of setting whether user institute requested operation is allowed to.
9. user right is got the generation method soon in the Access Control List (ACL) as claimed in claim 8, it is characterized in that integration wherein is to integrate the computation rule table according to a default authority to carry out the authority integration.
10. user right is got the generation method soon in the Access Control List (ACL) as claimed in claim 8, it is characterized in that wherein default two types of users of dummy argument node and corresponding authority setting, and the keeper has the complete control of user file, and the general user is readable to be write.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2003101117599A CN100377110C (en) | 2003-10-10 | 2003-10-10 | User authority rapid access generation system in call control list and method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2003101117599A CN100377110C (en) | 2003-10-10 | 2003-10-10 | User authority rapid access generation system in call control list and method thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1605992A true CN1605992A (en) | 2005-04-13 |
CN100377110C CN100377110C (en) | 2008-03-26 |
Family
ID=34759445
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2003101117599A Expired - Fee Related CN100377110C (en) | 2003-10-10 | 2003-10-10 | User authority rapid access generation system in call control list and method thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100377110C (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100465967C (en) * | 2007-08-20 | 2009-03-04 | 华为技术有限公司 | Inquiry result processing method and device |
CN101923620A (en) * | 2009-06-17 | 2010-12-22 | 富士施乐株式会社 | Computer readable medium, method for controlling execution of processing, and information processing apparatus |
CN102456011A (en) * | 2010-10-21 | 2012-05-16 | 镇江金软计算机科技有限责任公司 | SaaS (Software as a Service) application software performance optimization method based on cache technology |
CN102612694A (en) * | 2009-11-25 | 2012-07-25 | 国际商业机器公司 | Extensible access control list framework |
CN102696040A (en) * | 2010-03-29 | 2012-09-26 | 雅马哈株式会社 | Relay device and file sharing method |
CN106326766A (en) * | 2016-08-16 | 2017-01-11 | 陈亮 | HBase data reading control method |
CN103078845B (en) * | 2012-12-19 | 2017-05-10 | 华为技术有限公司 | Method for calibrating access control list (ACL), and shared storage system |
CN106776706A (en) * | 2016-11-16 | 2017-05-31 | 航天恒星科技有限公司 | Method for managing user right and device based on caching |
CN107480537A (en) * | 2017-06-28 | 2017-12-15 | 北京小度信息科技有限公司 | Authority the Resources list automatic generation method and device |
WO2019000979A1 (en) * | 2017-06-30 | 2019-01-03 | 华为技术有限公司 | File system access rights configuration method and device |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5956715A (en) * | 1994-12-13 | 1999-09-21 | Microsoft Corporation | Method and system for controlling user access to a resource in a networked computing environment |
US6622220B2 (en) * | 2001-03-15 | 2003-09-16 | Hewlett-Packard Development Company, L.P. | Security-enhanced network attached storage device |
CN1182466C (en) * | 2001-07-09 | 2004-12-29 | 大买家科技股份有限公司 | File usage authority defining system and method |
CN1437116A (en) * | 2002-02-07 | 2003-08-20 | 顾士平 | Fixed disk, disk array, electronic disk, iSCSI, SAN and NAS control method |
-
2003
- 2003-10-10 CN CNB2003101117599A patent/CN100377110C/en not_active Expired - Fee Related
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100465967C (en) * | 2007-08-20 | 2009-03-04 | 华为技术有限公司 | Inquiry result processing method and device |
CN101923620B (en) * | 2009-06-17 | 2015-08-19 | 富士施乐株式会社 | The method that the execution of process is controlled and signal conditioning package |
CN101923620A (en) * | 2009-06-17 | 2010-12-22 | 富士施乐株式会社 | Computer readable medium, method for controlling execution of processing, and information processing apparatus |
CN102612694A (en) * | 2009-11-25 | 2012-07-25 | 国际商业机器公司 | Extensible access control list framework |
CN102696040B (en) * | 2010-03-29 | 2015-11-25 | 雅马哈株式会社 | Relay and file sharing method |
CN102696040A (en) * | 2010-03-29 | 2012-09-26 | 雅马哈株式会社 | Relay device and file sharing method |
CN102456011A (en) * | 2010-10-21 | 2012-05-16 | 镇江金软计算机科技有限责任公司 | SaaS (Software as a Service) application software performance optimization method based on cache technology |
CN103078845B (en) * | 2012-12-19 | 2017-05-10 | 华为技术有限公司 | Method for calibrating access control list (ACL), and shared storage system |
CN106326766A (en) * | 2016-08-16 | 2017-01-11 | 陈亮 | HBase data reading control method |
CN106326766B (en) * | 2016-08-16 | 2019-04-09 | 陈亮 | A kind of HBase reading data control method |
CN106776706A (en) * | 2016-11-16 | 2017-05-31 | 航天恒星科技有限公司 | Method for managing user right and device based on caching |
CN107480537A (en) * | 2017-06-28 | 2017-12-15 | 北京小度信息科技有限公司 | Authority the Resources list automatic generation method and device |
WO2019000979A1 (en) * | 2017-06-30 | 2019-01-03 | 华为技术有限公司 | File system access rights configuration method and device |
US11238175B2 (en) | 2017-06-30 | 2022-02-01 | Huawei Technologies Co., Ltd. | File system permission setting method and apparatus |
Also Published As
Publication number | Publication date |
---|---|
CN100377110C (en) | 2008-03-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220075767A1 (en) | System and method for clustering distributed hash table entries | |
US7783737B2 (en) | System and method for managing supply of digital content | |
US8069269B2 (en) | Methods and apparatus for accessing content in a virtual pool on a content addressable storage system | |
CN100456311C (en) | System and method for actualizing content-based file system security | |
CN103150394B (en) | Distributed file system metadata management method facing to high-performance calculation | |
US6633872B2 (en) | Extendible access control for lightweight directory access protocol | |
KR101265815B1 (en) | System and methods providing enhanced security model | |
US20200250333A1 (en) | Data management system and data management method | |
US20100262624A1 (en) | Discovery of inaccessible computer resources | |
US9430665B2 (en) | Dynamic authorization to features and data in JAVA-based enterprise applications | |
US9286307B2 (en) | Document management apparatus improved in efficiency of deletion of files, method of controlling the same, and storage medium | |
CN106537345A (en) | Precisely tracking memory usage in multi-process computing environment | |
CN106682186A (en) | File access control list (ACL) management method and related device and system | |
CN1629826A (en) | Method and apparatus for data retention in a storage system | |
US20110218999A1 (en) | System, method and program for information processing | |
CN100370441C (en) | Method for traversing licensing rights in access control list | |
CN105051749A (en) | Policy based data protection | |
CN106021445A (en) | Cached data loading method and apparatus | |
CN107784108A (en) | A kind of data storage and management method, device and equipment | |
CN105681295B (en) | It is associated with big data sharing method and device | |
CN1605992A (en) | User authority rapid access generation system in call control list and method thereof | |
CN106372266A (en) | Cache and accessing method of cloud operation system based on aspects and configuration documents | |
US6055534A (en) | File management system and file management method | |
US7539813B1 (en) | Methods and apparatus for segregating a content addressable computer system | |
CN107196947A (en) | A kind of accesses control list method to set up and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20080326 Termination date: 20141010 |
|
EXPY | Termination of patent right or utility model |