KR20170062248A - System for supporting user-defined collaborative workspaces - Google Patents
System for supporting user-defined collaborative workspaces Download PDFInfo
- Publication number
- KR20170062248A KR20170062248A KR1020150167829A KR20150167829A KR20170062248A KR 20170062248 A KR20170062248 A KR 20170062248A KR 1020150167829 A KR1020150167829 A KR 1020150167829A KR 20150167829 A KR20150167829 A KR 20150167829A KR 20170062248 A KR20170062248 A KR 20170062248A
- Authority
- KR
- South Korea
- Prior art keywords
- user
- resource
- token
- terminal
- server
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/103—Workflow collaboration or project management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H04L67/2809—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Marketing (AREA)
- General Business, Economics & Management (AREA)
- Data Mining & Analysis (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- Economics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The present invention relates to a user-defined collaborative workspace support system, and more particularly, to a cloud computing environment in which a user who is not registered in a cloud storage service is a resource of a collaborative workspace, To a user-defined collaborative workspace support system.
According to the present invention, in using a collaborative workspace based on a cloud storage, even if the cloud storage service is unregistered, the resource of the collaborative work space provided by the service can be facilitated without complicated registration procedures such as inputting personal information The advantage is that it can be used. In addition, it provides a concurrency control service that does not require a separate server, thereby maintaining the consistency of resources in a collaborative workspace where resources are modified asynchronously.
Description
The present invention relates to a user-defined collaborative workspace support system, and more particularly, to a cloud computing environment in which a user who is not registered in a cloud storage service is a resource of a collaborative workspace, To a user-defined collaborative workspace support system.
As the network is developed, the structure of the system is simplified, and the Internet service using remote communication is actively achieved. In keeping with that, cloud storage such as Google Drive or OpenStack Swift and Dropbox allows users to remotely store resources, Service. That is, the cloud storage is one of typical cloud computing models and provides a resource management function. The cloud storage service provider operates a large virtualized data center and provides users with unlimited storage space. Cloud storage service users can easily access resources through cloud storage services anywhere, anytime, with no time and space constraints using Internet connected devices. This cloud storage service allows users to easily manage the same resources using multiple devices.
Cloud storage services are not limited to users' personal storage services, but they also provide a group-wide collaborative environment by sharing resources among multiple users. Such a system is called a collaborative system. The above-described collaboration system provides various services and collaborative workspaces to a plurality of users or group members to create an environment in which group work can be performed together. A collaborative workspace is a physical storage space that provides a function of sharing resources among users and managing the resources.
However, a conventional collaborative workspace support system (i.e., a collaborative system) allows only specific users registered in the cloud storage service to be assigned workspaces, and does not provide workspaces that can be used even if they are not registered. In addition, the user has to input various personal information in order to register in the above cloud storage service. For this reason, users tend to not actively collaborate through traditional collaboration systems, and some users share resources through traditional communication methods such as e-mail. Therefore, there is a need for a system that enables users to easily form groups and access collaborative workspaces.
SUMMARY OF THE INVENTION The present invention has been made to overcome the above problems of the prior art, and it is an object of the present invention to provide a system which can easily access and collaborate with a resource of a collaborative workspace even if a user who is not registered in the service is requested by a registered user of the cloud storage service There is a purpose.
It is also an object of the present invention to provide a concurrency control service that does not require a separate server in order to prevent resource utilization from occurring asynchronously through cooperation among users.
According to an aspect of the present invention, there is provided a system for providing a collaborative workspace for a terminal connected to a network, the system comprising: a server unregistered user who wants to access a resource of the collaborative workspace; A first terminal for receiving authentication information for a server registration user; A server for assigning the collaboration workspace to the server registration user and generating a token corresponding to the authentication information received from the first terminal; And a second terminal for accessing the resource using the token received from the server and the location information of the collaboration workspace.
The server comprises: a storage node for storing data generated in the collaboration workspace including the resource; And a proxy node for controlling the storage node and processing the authentication information received from the first terminal.
Wherein the proxy node generates the token when receiving the authentication information from the first terminal and transmits the token and the location of the collaboration workspace to a second terminal of the server unregistered user corresponding to the authentication information, And generates an access control list using the token. The location information of the collaboration workspace is in the form of a URL (uniform resource locator).
When receiving a use request for the resource from the server unregistered user, the second terminal requests access to the resource to the proxy node, and transmits the token received from the proxy node together.
Further, the proxy node may control access of the second terminal to the resource only when the token received in the access request for the resource is registered in the access control list, Upon receiving an update request for the access control list from the terminal, updates the access control list. The proxy node changes the value of the token and transmits the changed token to the second terminal when the number of times that the second terminal requests the resource access through the token becomes a threshold value or more.
The authentication information includes an email address of the server unregistered user and an access authority rank, and the token is a combination of characters and symbols encrypted based on the authentication information for security, A first rank capable of viewing and modifying a resource; And a second rank capable of only viewing the resource.
Finally, when one of the users uses the resource, the proxy node restricts access of another user until the use of the user is terminated.
According to the user-defined collaborative workspace support system of the present invention, even if the cloud storage service is unregistered, the resources of the collaborative work space provided by the service can be easily accessed without complicated registration procedures such as inputting personal information There is an advantage that it can be used.
In addition, it provides a concurrency control service that does not require a separate server, thereby maintaining the consistency of resources in a collaborative workspace where resources are modified, deleted, or changed asynchronously.
1 is a configuration diagram of a user-defined collaborative workspace support system according to a preferred embodiment of the present invention.
FIG. 2 is a diagram illustrating an operation principle of a user-defined collaborative workspace support system according to a preferred embodiment of the present invention.
FIG. 3 is a diagram illustrating the operation principle of a user-defined collaborative workspace support system according to another embodiment of the present invention.
4 is a diagram showing the operation principle of middleware of a conventional collaborative workspace support system.
5 is a diagram illustrating an operation principle of a middleware of a user-defined collaborative workspace support system according to another embodiment of the present invention.
6A and 6B are views showing the operation principles of the RefererAut middleware and the ConControl middleware among the middleware of the user-defined collaborative workspace support system shown in FIG.
Conventional workspaces simply provide the ability to store and manage resources for users. However, as the development of networks has increased the speed and accessibility of the Internet, workspace has been increasingly used for sharing resources between users. Thus, conventional workspaces are evolving into collaborative workspaces that provide a variety of collaborative services such as sharing and management of resources to multiple users and group members.
Collaborative workspaces allow multiple users to manage resources together, allowing the user to specify access controls for the shared scope and resources of the resource. In addition, it ensures a quick response time to the user's request so that the user can perform the group operation in real time. Finally, collaborative workspaces are characterized by supporting various concurrency control techniques to maintain the consistency of shared resources.
In order to solve the problems of the conventional collaborative system while preserving the characteristics of the collaborative workspace as described above, it is necessary to provide a resource of the collaborative workspace even if the user is not registered in the cloud storage service And provides a user-defined collaborative workspace support system that provides services that can be used effectively.
Hereinafter, embodiments of a user-defined collaborative workspace support system according to the present invention will be described in detail with reference to the accompanying drawings.
1 is a configuration diagram of a user-defined collaborative workspace support system according to a preferred embodiment of the present invention.
1, the user-defined collaborative
The
The
Hereinafter, a specific operation of a user-defined collaborative workspace support system according to a preferred embodiment of the present invention will be described with reference to FIG.
FIG. 2 is a diagram illustrating an operation principle of a user-defined collaborative workspace support system according to a preferred embodiment of the present invention.
A plurality of terminals are networked with the
The authentication information may include an e-mail address of a server unregistered user and an access authority rank. The access authority ranking can be divided into one or more steps, which may include a first rank capable of both reading and modifying the resource, and a second rank capable of only browsing the resource. However, the ranking is merely an example, and other resource utilization methods such as sorting, filtering, and the like may be added as new items according to the access authority rank. The server registration user can request the access privilege ranking of the server unregistered user at any time and the
The token serves as a kind of invitation to prevent any user from accessing the collaborative workspace, and the terminals with the token can access the collaborative workspace of the server registration user. As described above, for security, the token is composed of a combination of characters and symbols encrypted based on the authentication information of the server unregistered user.
The
The second and
On the other hand, when the server registration user desires to change the access authority ranking of the server unregistered user or invite another server unregistered user, the
Here, the threshold value may be input together with the authentication information of the server unregistered user when the server registration user inputs the collaboration workspace and inputs the authentication information of the server unregistered user to the
Finally, in order to maintain the consistency of the resources (concurrency control), the
As described above, according to the preferred embodiment of the user-defined collaborative workspace support system according to the present invention, the problems of the conventional collaboration system can be overcome.
Hereinafter, another embodiment of the user-defined collaborative workspace support system according to the present invention will be described in detail with reference to FIG. 3 to FIG.
Another embodiment of the user-defined collaborative workspace support system according to the present invention can be implemented in a different configuration of middleware in 'Swift', a cloud storage service of an open-source cloud platform 'Openstack' . The Swift manages the workspace on an account, container, and object basis for effective resource management. An account is a unit of Swift's workspace, and users can access that workspace through a uniform resource locator (URL) based on the unique ID of the account. A container is a component that stores a schedule file or data in the concept of a folder (foler) in Swift. The swift can access the corresponding component using the above URL and request work.
Swift provides a workspace that allows users to manage their resources by assigning an account. To use Swift's workspace among group users, it must be used in conjunction with Keystone, an OpenStack authentication service that supports user authentication and group management. The detailed description thereof will be omitted since it is a publicly known technology widely known to the ordinary artisan.
3 is a diagram illustrating an operation principle of a user-defined collaborative workspace support system according to another embodiment of the present invention.
① A user who wants to create a collaborative workspace registers a user with the cloud storage service, and allocates a workspace to create a resource to perform collaboration. (2) The registered user designates an e-mail address and a resource-specific access right of a specific unregistered user through a management tool provided by the cloud storage service. ③ The next designated email address will be sent tokens used to access resources in the collaborative workspace of cloud storage. Finally, the unregistered users receiving the token can access the cloud storage service using only the token, and can collaborate with other users without having to register with the cloud storage service.
In order to make the system operate as described above, Swift's Referer technique can be used. The referrer means a technique of setting access control list in a container and accessing a resource with a specified character string without additional authentication. To perform the referrer, another embodiment of the present invention may add RefereAuth middleware to the swift proxy middleware pipe line.
FIG. 4 is a diagram illustrating an operation principle of a middleware of a conventional collaborative workspace support system, and FIG. 5 is a diagram illustrating an operation principle of a middleware of a user-defined collaborative workspace support system according to another embodiment of the present invention.
4 and 5, in comparison with a conventional collaborative workspace support system, another embodiment of a user-defined collaborative workspace support system according to the present invention includes Swift authentication middleware (SwiftAuth middleware) in the following order.
FIG. 6A is a diagram specifically illustrating the operation principle of the RefererAuth middleware in the user-defined collaborative workspace support system of FIG.
As shown in FIG. 6A, the referrer authentication middleware is performed as follows. ① The owner (registered user) of the collaboration group sends a request including the email information and the access authority rank information of group members (unregistered users) through the management tool provided by Swift. ② In the referrer authentication middleware, the Jason file of the group member authentication information is parsed. ③ Generate referrer tokens using the authentication information of each group member. ④ Create a request to update the corresponding referer token in each container's access control list. ⑤ Update request for container is forwarded to Swift container server and applied. ⑥ After applying, send the referrer tokens and the URL of the workspace to each group member's e-mail.
According to the configuration applied to the container through the referrer authentication middleware, the unregistered members can access the resource with their referer token. At this time, the members do not need to subscribe to the cloud storage service.
Table 1 below shows classes and functions of the referrer authentication middleware implemented based on the WSGI (web server gateway interface).
The referrer authentication middleware starts from the filter_factory () function in Table 1 above. The filter_factory () function is called in order when Swift Proxy Server is started. The order in which they are invoked follows the order of the middleware pipeline specified in the Swift Proxy Server's configuration file. The referrer middleware class initialized by the filter_factory () function is called by the user's request at a later time. Then functions for implementing a custom collaborative workspace in the handle_request () function of the referer context class operate. The handle_request () function processes the user's request in the following process.
① It confirms whether it is a request for creation of user-defined collaborative workspace through X_ACL header of HTTP header of user request. ② Parse the Jason file received from the user using the parseACL () function. ③ Create the token for each user by calling the makeToken () function based on the parsed member-specific authentication information. ④ Create a request to be sent to each container server to update the container's access control list. ⑤ Send a request to update the ACL information to each container server and send the token to the members' email.
The user-specified authentication information for each member can be converted into access control list information for each container in the handle_request () function. The converted access control list information registers the access control list in the container by transmitting a request for each container. Table 2 below shows the Python source code of the handle_request () function that generates a request to update each container access control list based on the converted access control list information and transmits the request to each container server.
The HTTP_X_CONTAINER_READ and HTTP_X_CONTAINER_WRITE headers in the user's request can specify access control lists for viewing and modifying the container. In addition, the PATH_INFOR information is a variable that specifies the container that is the target of the request. Then, when the PATH_INFOR information is designated as a corresponding container and the authority is specified and the next middleware of the pipeline is called using the app_call () function as in the source code of Table 2, the corresponding access control list information can be registered in the container.
Meanwhile, in the referrer authentication middleware, a referrer token is generated based on the user's authentication information and registered in the access control list of the container. The referrer authentication middleware uses the e-mail address of the group member and the location information of the containers of the account to generate the referrer token. The referer token can be generated in 32 character combinations by encrypting it using MD5 (a 128 bit cryptographic hash function) based on user information. In the above-described manner, each group member can receive a unique referer token including his / her authentication information.
Any user's access using the referer token may be accompanied by security problems. Therefore, when accessing a resource using a referer token, no user authentication is performed. Therefore, when a referer token is leaked, another user can access the resource with malicious purpose. Therefore, in order to solve the above problem, it is possible to use a method of changing the referrer token according to a certain session time or limiting the number of times. The generated referrer token thus returns a new referer token value for each session of the user's request. The changed token value is returned as a response to the user request and the old referer token is not available from the time the referer token is changed.
Hereinafter, a concurrency control technique in another embodiment of a user-defined collaborative workspace support system according to the present invention will be described.
In a collaborative environment, it is desirable to support concurrency control on resources, since many requests for shared resources occur asynchronously. In another embodiment of the present invention, it is not necessary to install a separate server, and it can be implemented through a con-control middleware. It can be provided at the API level for use in user or application applications.
As shown in FIG. 5, the cone-control middleware is implemented through the WSGI interface and added to the middleware pipeline of the Swift proxy server. Since the cone control middleware must be performed after every authentication process and validation, it is added to the proxy server middleware, which is the final position of the pipeline, to check the resource usage rights.
A user can obtain or return a permission by adding a specific header to an HTTP request and register or release the shared resource as a resource requiring concurrency control. Table 3 below shows HTTP headers and their values required for performing concurrency control through cone control middleware.
The control-middleware manages a list of resources requiring concurrency control and a table storing user information of each list. The X-CC header is an HTTP header for registering or releasing a resource in a list of resources requiring concurrency control. In addition, the user request using the X-LOCK header can acquire the resource usage right and register the tenant and the user name of the user who has acquired the authority to the table storing the user information.
FIG. 6B is a diagram specifically illustrating the operation principle of the ConControl middleware among the middleware of the user-defined collaborative workspace support system of FIG.
As shown in FIG. 6B, checks the value of the HTTP header and the header of the user to perform a role. The user must obtain the right to use the resource in order to modify the resource registered as a resource requiring concurrency control. When a user requests a permission, the con- trol middleware verifies that the resource is a resource requiring concurrency control, and grants permission to the resource when there is no user already in use. At the same time, the user's information is stored in a table that manages usage rights, and the resource is locked. If a request for a license is issued for a resource already in use by another user, the existing user is waited for the permission to be returned. The timeout for the waiting time can be specified by the user in advance through the setting. If there is a time limit for the acquisition request, the request fails and returns the result to the user.
The con-control middleware can use Python's synchronized queue to implement the above locking scheme. The cone control middleware may be implemented by creating a synchronization queue having a size of 1 by setting a time limit time in the PUT function of the synchronization queue. The generated synchronization queue is not accessible at the same time to maintain the consistency of the data stored in the queue. Using the features of this synchronization queue, cone-control middleware can implement concurrency control functions in Swift.
It will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the present invention as defined by the following claims. will be. Therefore, it should be understood that the above-described embodiments are illustrative and non-restrictive in every respect. Therefore, the true scope of the present invention should be determined by the following claims.
1: System 21: Proxy node
10: first terminal 22: storage node
20: Server
30:
40: Third terminal
Claims (10)
A first terminal for receiving authentication information for a server unregistered user who wishes to access a resource of the collaboration workspace from a server registration user;
A server for assigning the collaboration workspace to the server registration user and generating a token corresponding to the authentication information received from the first terminal; And
And a second terminal for accessing the resource using the token received from the server and the location information of the collaboration workspace.
The server comprises:
A storage node for storing data generated in the collaboration workspace including the resource; And
And a proxy node for controlling the storage node and processing the authentication information received from the first terminal.
The proxy node,
Generating the token when receiving the authentication information from the first terminal and transmitting the token and the location information of the collaboration workspace to a second terminal of the server unregistered user corresponding to the authentication information,
Wherein the access control list is generated using the token.
Wherein the location information of the collaboration workspace includes:
And a URL (uniform resource locator) format.
The second terminal,
Wherein the proxy node transmits an access request to the proxy node and the token received from the proxy node together when receiving a use request for the resource from the server unregistered user, system.
The proxy node,
And controls access of the second terminal to the resource only when the token received in the access request for the resource is registered in the access control list,
And updates the access control list upon receiving an update request for the access control list from the first terminal.
The proxy node,
And changing the value of the token and transmitting the changed token to the second terminal when the number of times that the second terminal requests the resource access through the token is equal to or more than a threshold value, system.
The authentication information includes:
An e-mail address of the server unregistered user and an access authority rank,
The token,
And a combination of characters and symbols encrypted based on the authentication information for security.
The access privilege ranking includes:
A first rank capable of viewing and modifying the resource; And
And a second rank capable of only viewing the resource.
The proxy node,
Wherein when the one of the users uses the resource, the access restriction of the other user is restricted until the use of the user is terminated.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150167829A KR101792357B1 (en) | 2015-11-27 | 2015-11-27 | System for supporting user-defined collaborative workspaces |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150167829A KR101792357B1 (en) | 2015-11-27 | 2015-11-27 | System for supporting user-defined collaborative workspaces |
Publications (2)
Publication Number | Publication Date |
---|---|
KR20170062248A true KR20170062248A (en) | 2017-06-07 |
KR101792357B1 KR101792357B1 (en) | 2017-11-20 |
Family
ID=59223660
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150167829A KR101792357B1 (en) | 2015-11-27 | 2015-11-27 | System for supporting user-defined collaborative workspaces |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR101792357B1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20200043223A (en) * | 2018-10-17 | 2020-04-27 | 주식회사 모티링크 | System for providing virtual working space and method for authorizing virtual working space user |
KR20200132375A (en) * | 2019-05-17 | 2020-11-25 | 주식회사 모티링크 | Method for authorizing virtual space user and system for providing virtual space |
CN117354069A (en) * | 2023-12-06 | 2024-01-05 | 自然资源陕西省卫星应用技术中心 | Remote sensing data management system and method based on data lake |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102338422B1 (en) | 2021-07-30 | 2021-12-10 | 클로우플레이크(주) | Method, device and system for providing collaboration tool service in cloud environment based on did |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012030624A1 (en) * | 2010-08-30 | 2012-03-08 | Vmware, Inc. | Unified workspace for thin, remote, and saas applications |
-
2015
- 2015-11-27 KR KR1020150167829A patent/KR101792357B1/en active IP Right Grant
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20200043223A (en) * | 2018-10-17 | 2020-04-27 | 주식회사 모티링크 | System for providing virtual working space and method for authorizing virtual working space user |
KR20200132375A (en) * | 2019-05-17 | 2020-11-25 | 주식회사 모티링크 | Method for authorizing virtual space user and system for providing virtual space |
CN117354069A (en) * | 2023-12-06 | 2024-01-05 | 自然资源陕西省卫星应用技术中心 | Remote sensing data management system and method based on data lake |
CN117354069B (en) * | 2023-12-06 | 2024-02-13 | 自然资源陕西省卫星应用技术中心 | Remote sensing data management system and method based on data lake |
Also Published As
Publication number | Publication date |
---|---|
KR101792357B1 (en) | 2017-11-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102209276B1 (en) | Messaging protocol communication management | |
US20220147644A1 (en) | Data storage architecture for an enterprise communication system | |
CN110383772B (en) | Techniques for rich communication for messaging robots | |
EP2828763B1 (en) | Method of modifying access control for web services using query languages | |
US9197417B2 (en) | Hosted application sandbox model | |
US9047462B2 (en) | Computer account management system and realizing method thereof | |
US8843648B2 (en) | External access and partner delegation | |
KR101792357B1 (en) | System for supporting user-defined collaborative workspaces | |
WO2010138910A1 (en) | Secure collaborative environment | |
EP2518972A1 (en) | System and method for device addressing | |
CN111052685B (en) | Method and apparatus for multi-agent messaging | |
US20090019517A1 (en) | Method and System for Restricting Access of One or More Users to a Service | |
KR20080100356A (en) | A method and system for managing xml document | |
JP2020526983A (en) | Aliase management method and device | |
CN103036597A (en) | Method and device of sharing resources among devices in close range | |
CN108702390B (en) | Transfer of control rights for a configuration source | |
US20100146123A1 (en) | Resource allocation method of each terminal apparatus using resource management system and resource management server apparatus | |
KR20150043150A (en) | Method and apparatus for access control system using relationship information | |
US10242174B2 (en) | Secure information flow | |
Takalo-Mattila et al. | Architecture for mixed criticality resource management in Internet of Things | |
KR20090002252A (en) | System and method for collaborative work of document | |
US20160337456A1 (en) | Probabilistic federated agent discovery for pervasive device management system | |
US11848923B2 (en) | Secure peer-to-peer connection network and associated protocols for a group-based communication system | |
US20140359071A1 (en) | Maintaining state synchronization of an application between computing devices as well as maintaining state synchronization of common information between different applications without requiring periodic synchronization | |
JP7225677B2 (en) | Information processing device and program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
AMND | Amendment | ||
E90F | Notification of reason for final refusal | ||
AMND | Amendment | ||
E601 | Decision to refuse application | ||
AMND | Amendment | ||
X701 | Decision to grant (after re-examination) | ||
GRNT | Written decision to grant |