RU2408070C2 - Механизмы обнаруживаемости и перечисления в иерархически защищенной системе хранения данных - Google Patents

Механизмы обнаруживаемости и перечисления в иерархически защищенной системе хранения данных Download PDF

Info

Publication number
RU2408070C2
RU2408070C2 RU2006101820/08A RU2006101820A RU2408070C2 RU 2408070 C2 RU2408070 C2 RU 2408070C2 RU 2006101820/08 A RU2006101820/08 A RU 2006101820/08A RU 2006101820 A RU2006101820 A RU 2006101820A RU 2408070 C2 RU2408070 C2 RU 2408070C2
Authority
RU
Russia
Prior art keywords
security
data
component
sdid
descriptor
Prior art date
Application number
RU2006101820/08A
Other languages
English (en)
Russian (ru)
Other versions
RU2006101820A (ru
Inventor
Джейсон Т. ХАНТЕР (US)
Джейсон Т. ХАНТЕР
Кедарнатх А. ДУБХАШИ (US)
Кедарнатх А. ДУБХАШИ
Саймон СКАРИА (US)
Саймон СКАРИА
Original Assignee
Майкрософт Корпорейшн
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Майкрософт Корпорейшн filed Critical Майкрософт Корпорейшн
Publication of RU2006101820A publication Critical patent/RU2006101820A/ru
Application granted granted Critical
Publication of RU2408070C2 publication Critical patent/RU2408070C2/ru

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/14Digital output to display device ; Cooperation and interconnection of the display device with other functional units
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformation of program code
    • G06F8/52Binary to binary
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99933Query processing, i.e. searching
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99939Privileged access

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Bioethics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Human Computer Interaction (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
RU2006101820/08A 2005-02-28 2006-01-23 Механизмы обнаруживаемости и перечисления в иерархически защищенной системе хранения данных RU2408070C2 (ru)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US65753605P 2005-02-28 2005-02-28
US60/657,536 2005-02-28
US11/168,589 US7370050B2 (en) 2005-02-28 2005-06-28 Discoverability and enumeration mechanisms in a hierarchically secure storage system
US11/168,589 2005-06-28

Publications (2)

Publication Number Publication Date
RU2006101820A RU2006101820A (ru) 2007-08-10
RU2408070C2 true RU2408070C2 (ru) 2010-12-27

Family

ID=36579947

Family Applications (1)

Application Number Title Priority Date Filing Date
RU2006101820/08A RU2408070C2 (ru) 2005-02-28 2006-01-23 Механизмы обнаруживаемости и перечисления в иерархически защищенной системе хранения данных

Country Status (9)

Country Link
US (1) US7370050B2 (enExample)
EP (1) EP1696330B1 (enExample)
JP (1) JP4896541B2 (enExample)
KR (1) KR101224703B1 (enExample)
AU (1) AU2006200199B2 (enExample)
BR (1) BRPI0600129A (enExample)
CA (1) CA2533864C (enExample)
ES (1) ES2627855T3 (enExample)
RU (1) RU2408070C2 (enExample)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2678496C2 (ru) * 2014-04-09 2019-01-29 МАЙКРОСОФТ ТЕКНОЛОДЖИ ЛАЙСЕНСИНГ, ЭлЭлСи Диспетчер политик устройства
RU2718233C1 (ru) * 2019-10-01 2020-03-31 Общество с ограниченной ответственностью «ПИРФ» (ООО «ПИРФ») Способ построения файловой системы на базе иерархии узлов

Families Citing this family (57)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7831795B2 (en) 2005-11-28 2010-11-09 Commvault Systems, Inc. Systems and methods for classifying and transferring information in a storage network
US20200257596A1 (en) 2005-12-19 2020-08-13 Commvault Systems, Inc. Systems and methods of unified reconstruction in storage systems
US8930496B2 (en) 2005-12-19 2015-01-06 Commvault Systems, Inc. Systems and methods of unified reconstruction in storage systems
US7693851B2 (en) * 2005-12-30 2010-04-06 Sap Ag Systems and methods for implementing a shared space in a provider-tenant environment
US20070156849A1 (en) * 2005-12-30 2007-07-05 Wolfgang Becker Systems and methods for delivering software upgrades in a provider-tenant environment
US7917607B2 (en) * 2005-12-30 2011-03-29 Sap Ag Software management systems and methods, including use of such systems and methods in a provider-tenant environment
US7680825B2 (en) 2005-12-30 2010-03-16 Sap Ag Systems and methods for generating tenant-specific properties for use in a provider-tenant environment
US20070156901A1 (en) * 2005-12-30 2007-07-05 Wolfgang Becker Generation and use of table links in a provider-tenant environment
US7698284B2 (en) * 2005-12-30 2010-04-13 Sap Ag Systems and methods for deploying a tenant in a provider-tenant environment
US7689593B2 (en) 2005-12-30 2010-03-30 Sap Ag Systems and methods for accessing a shared space in a provider-tenant environment
US20070162969A1 (en) * 2005-12-30 2007-07-12 Becker Wolfgang A Provider-tenant systems, and methods for using the same
US20070156902A1 (en) * 2005-12-30 2007-07-05 Becker Wolfgang A Systems and methods for implementing a tenant space in a provider-tenant environment
US7756821B2 (en) * 2006-11-02 2010-07-13 Microsoft Corporation Virtual deletion in merged file system directories
US8027993B2 (en) * 2006-12-28 2011-09-27 Teradota Us, Inc. Techniques for establishing and enforcing row level database security
US20080162587A1 (en) * 2006-12-29 2008-07-03 Ulrich Auer Server synchronization for maintenance activities
US7933869B2 (en) * 2006-12-29 2011-04-26 Sap Ag Method and system for cloning a tenant database in a multi-tenant system
US20080162483A1 (en) * 2006-12-29 2008-07-03 Becker Wolfgang A Methods and systems for protecting shared tables against unauthorized overwriting from a tenant space in a mega-tenancy environment
US20080162536A1 (en) * 2006-12-29 2008-07-03 Becker Wolfgang A Systems and methods for extending shared data structures with tenant content in a provider-tenant environment
US8069184B2 (en) 2006-12-29 2011-11-29 Sap Ag Systems and methods to implement extensibility of tenant content in a provider-tenant environment
US20080162490A1 (en) * 2006-12-29 2008-07-03 Becker Wolfgang A Methods and systems for automatic registration during deployment of a tenant
US7739348B2 (en) * 2006-12-29 2010-06-15 Sap Ag Systems and methods for accessing a shared space in a provider-tenant environment by using middleware
US9286385B2 (en) * 2007-04-25 2016-03-15 Samsung Electronics Co., Ltd. Method and system for providing access to information of potential interest to a user
US8315999B2 (en) 2007-08-29 2012-11-20 Nirvanix, Inc. Policy-based file management for a storage delivery network
US20090144183A1 (en) * 2007-08-29 2009-06-04 Nirvanix, Inc. Managing user accounts for storage delivery network
US9900347B2 (en) * 2007-09-14 2018-02-20 Telefonaktiebolaget Lm Ericsson (Publ) Handling trust in an IP multimedia subsystem communication network
US8316442B2 (en) * 2008-01-15 2012-11-20 Microsoft Corporation Preventing secure data from leaving the network perimeter
US8296820B2 (en) * 2008-01-18 2012-10-23 International Business Machines Corporation Applying security policies to multiple systems and controlling policy propagation
US8296301B2 (en) 2008-01-30 2012-10-23 Commvault Systems, Inc. Systems and methods for probabilistic data classification
US7836174B2 (en) 2008-01-30 2010-11-16 Commvault Systems, Inc. Systems and methods for grid-based data scanning
US20090282043A1 (en) * 2008-05-07 2009-11-12 Srinivas Ganesh Dharmavaram System And Method For Concurrency Control Of Logically Grouped Shared Objects In A Multi-User Environment
US9047277B2 (en) * 2008-12-18 2015-06-02 Adobe Systems Incorporated Systems and methods for synchronizing hierarchical repositories
US8224828B2 (en) 2009-12-22 2012-07-17 Sap Ag Multi-client generic persistence for extension fields
US8572760B2 (en) * 2010-08-10 2013-10-29 Benefitfocus.Com, Inc. Systems and methods for secure agent information
US8892523B2 (en) 2012-06-08 2014-11-18 Commvault Systems, Inc. Auto summarization of content
US9069817B2 (en) 2012-11-28 2015-06-30 International Business Machines Corporation Database row access control
US8959595B2 (en) 2013-03-15 2015-02-17 Bullaproof, Inc. Methods and systems for providing secure transactions
US10038550B2 (en) 2013-08-08 2018-07-31 Intel Corporation Instruction and logic to provide a secure cipher hash round functionality
US9456335B2 (en) 2013-09-21 2016-09-27 Oracle International Corporation Method and system for defining an offlinable model graph
CN106155298B (zh) 2015-04-21 2019-11-08 阿里巴巴集团控股有限公司 人机识别方法及装置、行为特征数据的采集方法及装置
US10055471B2 (en) 2015-11-18 2018-08-21 American Express Travel Related Services Company, Inc. Integrated big data interface for multiple storage types
US10445324B2 (en) 2015-11-18 2019-10-15 American Express Travel Related Services Company, Inc. Systems and methods for tracking sensitive data in a big data environment
US10169601B2 (en) 2015-11-18 2019-01-01 American Express Travel Related Services Company, Inc. System and method for reading and writing to big data storage formats
US10037329B2 (en) 2015-11-18 2018-07-31 American Express Travel Related Services Company, Inc. System and method for automatically capturing and recording lineage data for big data records
US10055444B2 (en) * 2015-12-16 2018-08-21 American Express Travel Related Services Company, Inc. Systems and methods for access control over changing big data structures
US10540516B2 (en) 2016-10-13 2020-01-21 Commvault Systems, Inc. Data protection within an unsecured storage environment
US10389810B2 (en) 2016-11-02 2019-08-20 Commvault Systems, Inc. Multi-threaded scanning of distributed file systems
US10922189B2 (en) 2016-11-02 2021-02-16 Commvault Systems, Inc. Historical network data-based scanning thread generation
US11295326B2 (en) 2017-01-31 2022-04-05 American Express Travel Related Services Company, Inc. Insights on a data platform
US20190181901A1 (en) * 2017-12-08 2019-06-13 T-Mobile Usa, Inc. Local profile assistant and application programming interface
US20190251204A1 (en) 2018-02-14 2019-08-15 Commvault Systems, Inc. Targeted search of backup data using calendar event data
US10642886B2 (en) 2018-02-14 2020-05-05 Commvault Systems, Inc. Targeted search of backup data using facial recognition
US11695777B2 (en) * 2019-02-26 2023-07-04 Vmware, Inc. Hybrid access control model in computer systems
US12118106B2 (en) * 2019-02-27 2024-10-15 K2 Software, Inc. Methods and systems for extending row-level security policies
US11397826B2 (en) 2020-10-29 2022-07-26 Snowflake Inc. Row-level security
EP4092556A1 (en) * 2021-05-20 2022-11-23 Nordic Semiconductor ASA Bus decoder
US20250199826A1 (en) * 2023-12-14 2025-06-19 Notion Labs, Inc. Workspace content search based on access permissions
CN120528713B (zh) * 2025-07-24 2025-10-24 安徽华之邦信息科技有限公司 一种云安全管理系统及其方法

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5701400A (en) * 1995-03-08 1997-12-23 Amado; Carlos Armando Method and apparatus for applying if-then-else rules to data sets in a relational data base and generating from the results of application of said rules a database of diagnostics linked to said data sets to aid executive analysis of financial data
US20020087877A1 (en) * 2000-12-28 2002-07-04 Grawrock David W. Platform and method of creating a secure boot that enforces proper user authentication and enforces hardware configurations
RU2207618C2 (ru) * 2001-08-27 2003-06-27 Щеглов Андрей Юрьевич Система контроля доступа к информационным ресурсам
US20030188198A1 (en) * 2002-03-28 2003-10-02 International Business Machines Corporation Inheritance of controls within a hierarchy of data processing system resources
US20040044655A1 (en) * 2002-09-04 2004-03-04 International Business Machines Corporation Row-level security in a relational database management system

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6158007A (en) * 1997-09-17 2000-12-05 Jahanshah Moreh Security system for event based middleware
US6457130B2 (en) * 1998-03-03 2002-09-24 Network Appliance, Inc. File access control in a multi-protocol file server
US6308181B1 (en) * 1998-12-19 2001-10-23 Novell, Inc. Access control with delayed binding of object identifiers
US7111321B1 (en) * 1999-01-25 2006-09-19 Dell Products L.P. Portable computer system with hierarchical and token-based security policies
US7509356B2 (en) * 2001-09-06 2009-03-24 Iron Mountain Incorporated Data backup
JP3982623B2 (ja) * 2003-03-25 2007-09-26 インターナショナル・ビジネス・マシーンズ・コーポレーション 情報処理装置、データベース検索システム及びプログラム
US20050070276A1 (en) * 2003-09-26 2005-03-31 Mcgarry Rob Systems and methods that provide modes of access for a phone
KR100553273B1 (ko) * 2003-11-14 2006-02-22 주식회사 넷츠 엑스트라넷 액세스제어 장치 및 방법
US20050138393A1 (en) * 2003-12-22 2005-06-23 Challener David C. Determining user security level using trusted hardware device
US8990254B2 (en) * 2004-07-02 2015-03-24 Ellie Mae, Inc. Loan origination software system for processing mortgage loans over a distributed network
US7549158B2 (en) * 2004-08-31 2009-06-16 Microsoft Corporation Method and system for customizing a security policy

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5701400A (en) * 1995-03-08 1997-12-23 Amado; Carlos Armando Method and apparatus for applying if-then-else rules to data sets in a relational data base and generating from the results of application of said rules a database of diagnostics linked to said data sets to aid executive analysis of financial data
US20020087877A1 (en) * 2000-12-28 2002-07-04 Grawrock David W. Platform and method of creating a secure boot that enforces proper user authentication and enforces hardware configurations
RU2207618C2 (ru) * 2001-08-27 2003-06-27 Щеглов Андрей Юрьевич Система контроля доступа к информационным ресурсам
US20030188198A1 (en) * 2002-03-28 2003-10-02 International Business Machines Corporation Inheritance of controls within a hierarchy of data processing system resources
US20040044655A1 (en) * 2002-09-04 2004-03-04 International Business Machines Corporation Row-level security in a relational database management system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2678496C2 (ru) * 2014-04-09 2019-01-29 МАЙКРОСОФТ ТЕКНОЛОДЖИ ЛАЙСЕНСИНГ, ЭлЭлСи Диспетчер политик устройства
RU2718233C1 (ru) * 2019-10-01 2020-03-31 Общество с ограниченной ответственностью «ПИРФ» (ООО «ПИРФ») Способ построения файловой системы на базе иерархии узлов

Also Published As

Publication number Publication date
RU2006101820A (ru) 2007-08-10
AU2006200199B2 (en) 2010-11-25
BRPI0600129A (pt) 2006-10-24
KR20060095451A (ko) 2006-08-31
EP1696330A3 (en) 2012-08-15
EP1696330A2 (en) 2006-08-30
US20060195449A1 (en) 2006-08-31
CA2533864C (en) 2013-12-24
EP1696330B1 (en) 2017-03-22
ES2627855T3 (es) 2017-07-31
JP4896541B2 (ja) 2012-03-14
KR101224703B1 (ko) 2013-01-21
US7370050B2 (en) 2008-05-06
AU2006200199A1 (en) 2006-09-14
CA2533864A1 (en) 2006-08-28
JP2006244485A (ja) 2006-09-14

Similar Documents

Publication Publication Date Title
RU2408070C2 (ru) Механизмы обнаруживаемости и перечисления в иерархически защищенной системе хранения данных
US12475085B2 (en) Systems and methods for in-place records management and content lifecycle management
US11574070B2 (en) Application specific schema extensions for a hierarchical data structure
US6308181B1 (en) Access control with delayed binding of object identifiers
US8180812B2 (en) Templates for configuring file shares
US11341118B2 (en) Atomic application of multiple updates to a hierarchical data structure
KR101024730B1 (ko) 항목 기반 저장 플랫폼 내에서 데이터 모델링하기 위한시스템 및 방법
US7779265B2 (en) Access control list inheritance thru object(s)
KR101219856B1 (ko) 데이터 프로세싱을 자동화하기 위한 방법 및 시스템
US20070100830A1 (en) Method and apparatus for access control list (ACL) binding in a data processing system
US20160036860A1 (en) Policy based data processing
MX2007014551A (es) Autorizacion unificada para aplicaciones heterogeneas.
US20100031312A1 (en) Method for policy based and granular approach to role based access control
KR20090079933A (ko) 제한된 네임스페이스 환경에서의 역 네임 맵핑을 위한, 자원으로의 액세스를 제한하는 시스템 및 파일 시스템의 구성요소로의 액세스를 제한하는 방법 및 컴퓨터-판독가능 매체
JP2009507275A (ja) 二重レイヤーアクセス制御リスト
US10726053B2 (en) System for lightweight objects
US20080034438A1 (en) Multiple hierarchy access control method
US20140189715A1 (en) Conversion of lightweight object to a heavyweight object
US7987470B1 (en) Converting heavyweight objects to lightwight objects
TWI848631B (zh) 檔案系統資料存取控管方法、電腦可讀取儲存媒體及資料儲存裝置
MXPA06001884A (en) Discoverability and enumeration mechanisms in a hierarchically secure storage system

Legal Events

Date Code Title Description
PC41 Official registration of the transfer of exclusive right

Effective date: 20150526

MM4A The patent is invalid due to non-payment of fees

Effective date: 20160124