WO2010092755A1 - ポリシー管理装置、ポリシー管理システム、それに用いる方法およびプログラム - Google Patents
ポリシー管理装置、ポリシー管理システム、それに用いる方法およびプログラム Download PDFInfo
- Publication number
- WO2010092755A1 WO2010092755A1 PCT/JP2010/000414 JP2010000414W WO2010092755A1 WO 2010092755 A1 WO2010092755 A1 WO 2010092755A1 JP 2010000414 W JP2010000414 W JP 2010000414W WO 2010092755 A1 WO2010092755 A1 WO 2010092755A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- policy
- subject
- ordering
- policies
- hierarchy
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
Definitions
- the present invention relates to a policy management apparatus, a policy management system, a method and a program used therefor, and in particular, a policy management apparatus capable of generating a policy list by converting a policy description having a partial order structure into a full order or converting it into an access control rule.
- the present invention relates to a management system, a method used therefor, and a program.
- OS access mechanisms such as the UNIX (registered trademark) file system
- object such as a file provided by the business system
- RBAC role-based access control
- This rule description for each role unit can suppress an increase in the number of rules compared to the description for each subject unit, so the burden on the administrator is reduced.
- ACL Access Control List
- RBAC Access Control Rule
- Patent Document 1 describes a method of hierarchizing policy sets and determining a set of subjects, objects, and actions to be permitted or denied based on the hierarchical structure.
- JP 2006-155104 A (paragraph 0071)
- the description order on the ACL is determined according to the inclusion relation of the subject set for each element of the policy set. is necessary.
- the access control mechanism sends the accounting file to the accounting file according to the ACL description derived from policy 1 for the concurrent staff who is a part of the accounting department. Will be allowed access.
- the correct description order in the single ACL corresponds to the entire order of the policy set defined above. That is, for policies pi and pj with pi ⁇ pj, if the corresponding ACL descriptions are A (pi) and A (pj), a single ACL is connected in the order of A (pi
- the subject sets S1, S2, S3, S4, and S5 corresponding to the respective policies have an inclusion relationship as shown in FIG. .
- the policy inclusion relationship included in P is p1> p2, p1> p3, p1> p4, p1> p5, p2> p4, p2> p5, p3> p4, and these orders (semi-order) are
- the total order ⁇ to be satisfied is ⁇ p1, p2, p3, p4, p5>, ⁇ p1, p2, p3, p5, p4> or the like.
- the RBAC policy management method does not disclose a specific method for obtaining the total order of policy sets based on the inclusion relationship of subject sets corresponding to policies, and includes a policy including a positive policy and a negative policy.
- the description order of the ACL corresponding to the set cannot be presented to the policy manager, or it cannot be correctly converted into a single ACL.
- Patent Document 1 For example, in the method described in Patent Document 1, based on the hierarchy (control path) of an object set, analysis is performed on whether or not there is a contradiction in access control settings with overlapping target resources, and a conflict is detected. Describes that one of the conflicting access control settings is corrected according to a given contradiction handling rule (whether the access effect value is equal to or greater than a predetermined access effect value).
- the present invention provides a policy management system, a policy management method, and a policy management program that can correctly convert a policy set including a positive policy and a negative policy into a single access control rule. Objective.
- a policy management apparatus includes role information storage means for storing role information including information indicating a subject set to which a policy is applied and information capable of specifying an inclusion relationship between subject sets included in the role information.
- Policy description storage means for storing a policy description including information indicating a policy and information for identifying a subject set to which the policy is applied, and two or more stored in the policy description storage means
- Policy hierarchies for generating a policy hierarchy in which two or more policies are hierarchized based on the inclusion relationship of subject sets to which each policy is applied, and each policy as a node. Based on the information indicating the policy hierarchy that has been made, A policy set by the policy above, while maintaining the upper and lower relations in the hierarchy, characterized in that a policy ordering means for full ordering.
- the policy management system stores role information that includes information indicating a subject set to which a policy is applied and information that can specify an inclusion relationship between subject sets included in the role information.
- a role storage device comprising storage means, a policy description storage device comprising policy description storage means for storing a policy description including information indicating a policy and information for identifying a subject set to which the policy is applied; For two or more policies stored in the policy description storage means, each policy is a node, and is applied to a subject set having no inclusion relationship based on the inclusion relationship of the subject set to which each policy is applied.
- a policy that generates a policy hierarchy that includes layers composed of policies Based on the information indicating the policy hierarchy generated by the stratification means and the policy tiering means, the policies based on the two or more policies that are the targets of total ordering while maintaining the hierarchical relationship between the policies of different layers
- a policy total ordering device including policy ordering means for totalizing the set.
- the policy ordering method includes two or more policies included in a policy set with respect to a given subject set in which an inclusion relationship between subject sets can be specified and a subject set to be applied.
- a policy hierarchy that includes layers composed of policies applied to subject sets that do not have a mutual inclusion relationship is generated based on the inclusion relationship of subject sets to which each policy is applied as a node.
- a policy ordering step for fully ordering the set.
- the policy list display method includes two or more policies included in a policy set with respect to a given subject set in which an inclusion relationship between subject sets can be specified and a subject set to be applied.
- a policy hierarchy that includes layers composed of policies applied to subject sets that do not have a mutual inclusion relationship is generated based on the inclusion relationship of subject sets to which each policy is applied as a node.
- Policies based on two or more policies that are subject to full ordering while maintaining the hierarchical relationship between the policies of different layers based on the policy hierarchy step to be performed and the information indicating the policy hierarchy generated in the policy hierarchy step A policy ordering step that fully orders the set, and a policy ordering step.
- the policy order determined as a total order characterized in that it comprises a list display step of list aligning elements of a policy set that are the subject of all ordered.
- the ACL generation method provides two or more policies included in a policy set with respect to a given subject set in which an inclusion relationship between subject sets can be specified and a subject set to be applied.
- For a policy generate a policy hierarchy that includes layers composed of policies applied to subject sets that do not have a containment relationship based on the inclusion relationship of the subject set to which each policy is applied, with each policy as a node
- Policies order determined as according to, characterized in that it comprises a ACL generating step of converting each policy description contained in the policy set are the subject total order of the ACL description.
- the policy ordering program includes, in a policy set, a policy set in which a given subject set and a subject set to be applied are shown that can specify a containment relationship between subject sets.
- a policy including a layer composed of policies applied to subject sets that do not have an inclusive relationship with each other based on the inclusive relationship of the subject set to which each policy is applied.
- two or more objects that are the targets of total ordering while maintaining the hierarchical relationship between the policies of different layers To execute policy ordering processing to order all policy sets by policy And features.
- the program for displaying a policy list includes, in the policy set, a policy set in which a given subject set and a subject set to be applied can be specified.
- a policy including a layer composed of policies applied to subject sets that do not have an inclusive relationship with each other based on the inclusive relationship of the subject set to which each policy is applied.
- two or more objects that are the targets of total ordering while maintaining the hierarchical relationship between the policies of different layers Policy ordering processing to order all policy sets by policy and policy order According to the policy order determined as total order in process to align the elements of the policy set which is the subject all ordered, characterized in that to execute a list display process of displaying the list.
- the ACL generation program according to the present invention is included in a policy set for a policy set in which a given subject set that can specify an inclusion relationship between subject sets and a subject set to be applied are indicated in a computer.
- a policy hierarchy including two or more policies, each of which is a node, and a layer composed of policies applied to subject sets that do not have an inclusive relationship with each other based on the inclusive relationship of subject sets to which each policy is applied.
- a policy set including both a positive policy and a negative policy can be correctly converted into a single access control rule.
- FIG. 1 is a block diagram illustrating a configuration example of a policy management system according to the first embodiment of this invention.
- the policy management system shown in FIG. 1 includes an access control policy management apparatus 1.
- the access control policy management apparatus 1 is a computer having a central processing unit (CPU) 100, and includes a policy database (DB) 102, a role DB 101, a policy hierarchization unit 103, and a policy ordering unit 104.
- FIG. 1 shows an example in which the access control policy management apparatus 1 includes all of the above-described components.
- the policy DB 102 and the role DB 101 are implemented as separate apparatuses (database systems) and connected via a network. It may be configured as shown.
- the policy DB 102 stores policy descriptions.
- the policy description includes, for example, a policy identifier (hereinafter referred to as a policy ID), a specific role identifier (hereinafter referred to as a role ID), and one or more descriptions that specify actions permitted or prohibited for each object. Information including elements. Further, the policy DB 102 receives the policy ID input from the policy hierarchizing means 103 and outputs the corresponding policy description from the stored policy descriptions.
- the role DB 101 stores information indicating a set of subjects such as a user name associated with each role ID.
- information that associates a role ID with a subject set may be referred to as role information.
- the role DB 101 receives the input of the role ID from the policy hierarchizing unit 103 and outputs a corresponding subject set from the stored subject sets.
- the information stored in the role DB 101 may include information that can specify an inclusion relationship between subject sets included in each role information. For example, information regarding the attribution of each subject set (which group the subject set belongs to in terms of the entire application range, etc.) may be included.
- the policy hierarchization means 103 extracts the corresponding policy description from the policy DB 102 while sequentially extracting the policy ID from the policy ID list 1032 stored in the internal primary storage device 1031 (see FIG. 2). Also, the role ID described in the extracted policy description is input to the role DB 101, and the corresponding subject set is extracted. Furthermore, policy hierarchy data with a directed link added between policy ID nodes having a policy ID as a node and an inclusion relationship in the extracted subject set is generated and output to the policy ordering unit 104.
- the policy hierarchy data is information describing a “policy hierarchy” defined as follows.
- a policy hierarchy as shown in FIG. 3 is obtained.
- the total order can be obtained by performing topological sorting.
- the relations included / included between the subject sets are used as ordering rules, and the policies are enumerated by applying the ordering rules to the set of subject sets.
- the concept of policy hierarchy is introduced in order to enumerate so as not to violate the original rule even if some elements are not included or included.
- the access right for each department is an RBAC policy
- a plurality of RBAC policies can be applied in the correct order by creating a policy hierarchy of the same type in the organizational hierarchy and applying it from the lower layer to the upper layer.
- the correct order means an order determined by a rule that “the policy of the lower department must be applied before the policy of the upper department”.
- the policy ordering means 104 outputs a policy ID string indicating the policy application order obtained by performing topological sorting on the policy hierarchy data output by the policy hierarchy means 103.
- the policy hierarchization unit 103 and the policy ordering unit 104 can be realized by a program for realizing these functions and the CPU 100 that executes control according to the program.
- FIG. 4 is a flowchart showing an example of the operation of the policy management system (more specifically, the access control policy management apparatus 1) of the present embodiment.
- the policy layering means 103 scans a policy ID list 1032 including N policy IDs from the top and extracts pid [k] that is the kth policy ID (step). A1).
- the initial value of k is 1.
- pid [k] is input to the policy DB 102 to obtain the corresponding policy description p [k] (step A2), and the rid [k], which is the role ID included in p [k], is assigned to the role DB 101.
- a corresponding subject set S [k] step A3
- a set of ⁇ pid [k], S [k]> is pushed to the stack area of the primary storage device 1031 (stored by the LIFO method).
- the policy hierarchization means 103 performs the following operation.
- the stack area includes ⁇ pid [1], S [1]>, ⁇ pid [2], S [2]>, ..., ⁇ pid [N], S [N]> (
- ⁇ pid [1], S [1]> to ⁇ pid [N], S [N]> are stored.
- the policy hierarchization means 103 first selects ⁇ pid [1], S [1]> or ⁇ pid [N], S [N]> from among S [1] to S [N] included in the input. All combinations using any two ⁇ S [1], S [2]>, ⁇ S [1], S [3]>,..., ⁇ S [1], S [N]> ,..., ⁇ S [N ⁇ 1], S [N]> ⁇ are generated (step A6), and the following operations of steps A7 to A12 are repeated for each combination.
- the policy hierarchization unit 103 determines the inclusion relationship between S [i] and S [j] (step A8).
- the policy hierarchization means 103 determines whether the determination result is (a) S [i] ⁇ S [j], (b) S [j] ⁇ S [i], or (c) There is no inclusion relationship. It operates as follows in each case. Note that the inclusion relationship between subject sets may be determined by referring to, for example, information regarding the attribution of each subject set stored in the role DB 101.
- the policy hierarchy means 103 generates policy hierarchy data indicating the policy hierarchy as shown in FIG. 5 and inputs the generated policy hierarchy data to the policy ordering means 104.
- FIG. 5 is an explanatory diagram illustrating an example of a policy hierarchy.
- FIG. 5 is an example in the case of targeting pid [1] to pid [8].
- the policy corresponding to the node located above is a principle policy, and corresponds to the node located below. It is shown that the policy is as exceptional as the policy.
- the policy ordering means 104 scans the input policy hierarchy data, performs topological sorting to determine the policy order, and outputs a policy ID string indicating the determined policy order (step A13).
- Topological sorting means that when an ordering rule and a set to be enumerated are given, “for any two elements a and b arranged in the order of a ⁇ b during sort output, a ⁇ b is at least contrary to the ordering rule. This is a sorting method in which all elements are arranged in one row while satisfying the condition that they are not in order, that is, the order given by the rules, or the combination to which the rules cannot be applied.
- FIG. 6 is a flowchart showing an example of the processing flow of the topological sort processing by the policy ordering means 104.
- the policy ordering means 104 first scans the input policy hierarchy data and extracts a set N of nodes having no input link (step B1).
- step B2 is recursively executed according to the depth-first search for the policy hierarchy data.
- step B2 when the node being referred to satisfies the following condition, the node is added to a predetermined stack.
- a visited flag is assigned to the reference node.
- the visited link flag is added to all the link destination nodes even if there is no output link in the node.
- pid [k] that is a policy ID corresponding to the number k assigned to the node is generated (step B3).
- the policy IDs in the list generated as described above are arranged in the order of “deep layer ⁇ shallow layer” corresponding to the N nodes in the policy hierarchy data. For example, when there is a directed path from the node n [j] to n [i], that is, when n [j] is in a deeper layer than n [i], pid [j], pid [i ] Appears in the list in the order. At this time, the subject set corresponding to pid [i] and pid [j] has a relationship of S [j] ⁇ S [i] based on the policy hierarchy data generation method in steps A8 to A11. The effect that the inclusive relation between the policy descriptions corresponding to i] and pid [j] is maintained is obtained.
- the entire order of the policy set can be uniquely obtained based on the inclusion relation of the subject set having a partial order structure.
- the policy DB 102 stores policy descriptions having the following contents as policies corresponding to the four subject sets.
- Policy ID p1: ⁇ Company-wide policy> Access to the company-wide Web server is permitted for users of the employee-wide role.
- Policy ID p2: ⁇ Accounting department policy> Access to the accounting department file server is permitted for users in the accounting department role.
- Policy ID p3: ⁇ HR department policy> Access to the HR department groupware server is permitted for users in the HR department role.
- Policy ID p4: ⁇ General Affairs Department Policy> Access to the General Affairs Department file server is permitted for users of the General Affairs Department role.
- Policy ID p5: ⁇ Accounting / HR concurrent policy> Access to the accounting department file server is prohibited and access to the HR department groupware server is prohibited for users in the accounting / HR concurrent role.
- the policy ID list 1032 of the policy hierarchization means 103 describes the above-mentioned policy IDs in the order of “p1” “p2” “p3” “p4” “p5”.
- the policy description format is sufficient if it can describe “role” such as accounting department and “resource” such as Web server / file server.
- XACML eXtende Access control Markup Language as shown in FIG. 8 is used.
- FIG. 8 is an explanatory diagram showing an example of policy description stored in the policy DB 102.
- ⁇ keiri_ichiro, keiri_jiro, jinji_hanako, jinji_kyouko, soumu_taro ⁇ is given as the user ID of all employees.
- keiri_ichiro and keiri_jiro belong to the accounting department
- jinji_hanako belongs to the accounting department and the human resources department (accounting and human resources)
- jinji_kyouko belongs to the human resources department
- “soumu_taro” belongs to the general affairs department. Assume that it is associated with each subject set.
- the corresponding role ID “all employee roles” is input to the role DB 101 to obtain a subject set including user IDs of all employees, and a set of policy ID and subject set is stored in the stack area. Store.
- the policy hierarchizing unit 103 extracts five subject sets stored in the stack area, and generates 10 combinations of subject sets (step A6). Then, policy hierarchy data is generated from each combination.
- FIG. 9 is an explanatory diagram illustrating an example of a policy hierarchy.
- five nodes nodes p1, p2, p3, p4, and p5
- six links node p5 to node 2, node 5) as directed links.
- the policy ordering means 104 performs topological sorting on such policy hierarchy data to determine the policy order (step A13).
- a node set ⁇ node p4, node p5 ⁇ having no input link is extracted (step B1).
- the depth priority search may be performed from any of these nodes, but here the search is performed from the node p5.
- a depth-first search is performed using the node p5 as a starting point, and a node p1 that meets the above conditions is detected and stored in the stack (step B2).
- a visited flag is assigned to the node p1.
- the policy ordering means 104 next performs the above condition determination for the nodes p2 to p3. Assuming that the node p2 is being referred to now, the link destination of the node p2 is only the node p1, and the visited flag is assigned to the node p1, so the node p2 satisfies the above condition. Therefore, the node p2 is stored in the stack, and a visited flag is assigned. The same applies to the node p3. Since the visited flag is finally assigned to all the nodes p1, node p2, and node p3 linked from the node p5, the node p5 is also stored in the stack and the visited flag is assigned. At this time, nodes are stored in the stack in the order of node p5, node p3, node p2, and node p1 from the top.
- node p4 which is another node without an input link.
- the policy ordering means 104 simply stores the node p4 in the stack, and visits A search flag is assigned and the search process is terminated.
- nodes are stored in the stack in the order of node p4, node p5, node p3, node p2, and node p1 from the top.
- the policy ordering means 104 generates a list of policy IDs corresponding to the reference nodes while referring to the nodes one by one from the top of the stack (step B3).
- a policy ID list arranged in the order of p4 ⁇ p5 ⁇ p3 ⁇ p2 ⁇ p1 is generated. This corresponds to the result of arranging policy IDs in the order of “deep layer ⁇ shallow layer” in the policy hierarchy data.
- FIG. 10 is a block diagram illustrating a configuration example of the policy management system according to the second embodiment.
- the policy management system shown in FIG. 10 is based on the first embodiment shown in FIG. 1, and the access control policy management apparatus 1 further includes an ACL generation condition input unit 107 and an ACL generation unit 108.
- the ACL generation condition input unit 107 includes a user input device such as a keyboard device or a mouse device, receives a condition input regarding a policy conversion range, and inputs the condition to the policy layering unit 103 in the form of a policy ID list. To do. A set of policy descriptions included in the conversion range is extracted from the policy DB 102 and input to the ACL generation unit 108.
- the ACL generation unit 108 has a secondary storage device, and for each policy description input from the ACL generation condition input unit 107, referring to the role DB 101 according to the policy order input from the policy ordering unit 104, The data is sequentially converted into an ACL description, and the conversion result (ACL description) is stored in the secondary storage device.
- the ACL generation condition input unit 107 can be realized by a user input device, a program for realizing a function related to reception and conversion of data input, and the CPU 100 that executes control according to the program.
- the ACL generation unit 108 can be realized by a program for realizing the function and the CPU 100 that executes control according to the program.
- FIG. 11 is a flowchart showing an example of the operation of the policy management system (more specifically, the access control policy management apparatus 1) of the present embodiment.
- the ACL generation condition input unit 107 receives an instruction input of a policy distribution condition (also referred to as an ACL generation condition) via the user input device (step D1).
- the condition includes at least a policy generation range.
- the policy generation range is stored in the policy DB 102 such as “all policies stored in the policy DB”, “policy not instructed to generate past ACL”, “policy corresponding to the specified role set”, and the like. Any condition can be specified as long as the specified set of policy descriptions can be specified.
- the ACL generation condition input means 107 identifies a policy set that matches the condition while referring to the policy DB 102 in accordance with the input condition regarding the policy generation range (step D2).
- the policy set identification method for example, when the policy description is stored in the policy DB 102 according to the policy DB schema as shown in FIG. 12, refer to the ACL generated flag column and the role ID column corresponding to the generation range condition. By doing so, it is possible to identify the policy ID that matches the condition. More specifically, the view may be generated with the following SQL statement.
- the ACL generation condition input unit 107 stores the list of policy sets (policy ID list) in the primary storage of the policy hierarchy unit 103. Copy (store) to device 1031.
- a set of corresponding policy descriptions is extracted from the policy DB 102 from the policy ID list and input to the ACL generating unit 108.
- the policy hierarchizing unit 103 and the policy ordering unit 104 perform the policy for the policy set stored in the primary storage device 1031 of the policy hierarchizing unit 103 in the same manner as the operations of Steps A1 to A13 of the first embodiment.
- Order data is generated (step D3).
- the ACL generation unit 108 converts each policy description input from the ACL generation condition input unit 107 into an ACL description according to the policy order data input from the policy ordering unit 104, and the same in the secondary storage device. Append to the file (step D4).
- FIG. 13 is a flowchart illustrating an example of a processing flow of conversion processing into an ACL description.
- the ACL generating unit 108 first extracts a set OA of a set of role ID and object action included in the currently referred policy description (step E1).
- an object is a file or a computer to be accessed, and an action is an operation performed on the object (for example, reading or writing to a file).
- the role ID is input to the role DB 101, and the corresponding subject set S is acquired (step E2). Thereafter, a direct product S ⁇ OA of the subject set S and the object / action set set OA is calculated (step E3).
- each of the above (S, O, A) pairs is converted into an ACL description and added to the secondary storage device (step E4).
- the ACL description format is arbitrary as long as S, O, and A can be identified.
- CSV Common, Separeted Valures
- the following ACL description may be generated.
- the exception / principle relationship between policies can be converted into an ACL description appropriately, that is, giving priority to exceptions.
- the policy hierarchizing unit 103 arranges the exception policy in a deeper layer to generate policy hierarchy data, and the policy ordering unit 104 moves the policy from the deeper layer to the shallower layer of the policy hierarchical data. This is because the IDs are ordered and converted into an ACL description based on the order.
- FIG. 14 is a block diagram illustrating a configuration example of the policy management system according to the third embodiment.
- the policy management system shown in FIG. 14 is based on the first embodiment shown in FIG. 1, and the access control policy management apparatus 1 further includes a policy display condition input unit 105 and a policy list display unit 106.
- the policy display condition input means 105 has a user input device such as a keyboard device or a mouse device, receives a condition input relating to a policy display range and display order, converts the policy display range into a policy ID list, and generates a policy hierarchy. Is input to the conversion means 103. The display order is input to the policy list display means 106.
- the policy list display means 106 has a display device such as a liquid crystal display device (LCD).
- a display device such as a liquid crystal display device (LCD).
- the policy list display means 106 receives input of display conditions from the policy display condition input means 105 to display in order of policy order, the policy ordering means 104.
- Each policy information (for example, policy ID) is displayed in a list on the display device in accordance with the policy order output by.
- the policy display condition input unit 105 can be realized by a user input device, a program for realizing a function related to reception and conversion of data input, and the CPU 100 that executes control according to the program. Further, the policy list display means 106 can be realized by a program for realizing the function, a CPU 100 that executes control according to the program, and a display device.
- FIG. 15 is a flowchart showing an example of the operation of the policy management system (more specifically, the access control policy management apparatus 1) of the present embodiment.
- the policy display condition input means 105 receives a display condition instruction input via the user input device (step C1).
- the display conditions include at least conditions regarding the polyly display range and the display order.
- the policy display range for example, a set of policy descriptions stored in the policy DB 102 such as “all policies stored in the policy DB”, “period related to update date / time”, “administrator ID that created the policy”, etc. Any condition can be specified as long as it can be specified.
- the display order for example, in addition to “policy application order”, “policy name dictionary order”, “policy update date / time order”, and the like may be designated.
- the policy display condition input means 105 identifies a policy set that matches the condition while referring to the policy DB 102 in accordance with the condition regarding the input policy display range (step C2).
- the policy set identification method for example, when the policy description is stored in the policy DB 102 in accordance with the policy DB schema as shown in FIG. 16, the update date / time column and the administrator ID column corresponding to the display range condition are referred to.
- the policy ID that matches the condition can be identified. More specifically, the view may be generated with the following SQL statement.
- the policy display condition input unit 105 stores the list of policy sets (policy ID list) in the primary storage of the policy hierarchy unit 103. Copy (store) to device 1031. Further, the received display condition is input to the policy list display means 106.
- the policy hierarchizing means 103 and the policy ordering means 104 generate policy order data for the policy set, similarly to the operations of Steps A1 to A13 of the first embodiment (Step C3).
- the policy list display unit 106 displays the policy ID that is each element of the policy set or the associated policy name via the display device (step C4).
- the policy list display means 106 may display a list screen as shown in FIG. In the example shown in FIG. 17, an example is shown in which policy IDs are displayed as a list in the instructed order.
- a radio button for selecting any one of “priority order”, “name order”, and “creation date order” is shown.
- the policy administrator who is the user of the access control policy management apparatus 1 can intuitively recognize the order in which the policies are applied, It becomes easier to find policy inconsistencies. For example, a policy administrator simply verifies a policy that appears after a policy he has created (ie, a policy with a lower priority), contradicts his policy, and actually applies it. You can discover different policies.
- FIG. 19 is a block diagram showing an outline of the present invention.
- the policy management apparatus 10 of the present invention includes role information storage means 11, policy description storage means 12, policy hierarchization means 13, and policy ordering means 14.
- the role information storage unit 11 (for example, the role DB 101) stores role information including information indicating a subject set to which a policy is applied, and information that can specify an inclusion relation between subject sets included in the role information. .
- the policy description storage unit 12 (for example, the policy DB 102) stores a policy description including information indicating a policy and information for identifying a subject set to which the policy is applied.
- the policy hierarchizing unit 13 (for example, the policy hierarchizing unit 103) has two or more policies stored in the policy description storage unit 12 as nodes and sets the inclusion relationship of the subject set to which each policy is applied. Based on this, a policy hierarchy including a layer composed of policies applied to subject sets that do not have an inclusive relationship with each other is generated. *
- the policy hierarchization unit 13 may generate a policy hierarchy by generating policy hierarchy data to which a directional link is added between policy nodes having an inclusion relationship in a subject set, for example.
- the policy ordering unit 14 (for example, the policy ordering unit 104) performs the total ordering while maintaining the hierarchical relationship between the policies of the different layers based on the information indicating the policy hierarchy generated by the policy hierarchizing unit 13.
- the policy sets based on two or more policies that are the targets of the are ordered.
- the policy ordering unit 14 is subject to total ordering by performing topological sorting according to a depth-first search for policy hierarchy data starting from each element of a set of nodes without input links. All policy sets may be ordered.
- the policy inclusion relationship can be derived from the subject set inclusion relationship, and the total order of the policy set can be uniquely determined based on the derived policy inclusion relationship.
- a policy set that simultaneously includes a static policy can be correctly converted into a single access control rule.
- FIG. 20 is a block diagram showing another configuration example of the policy management apparatus as an outline of the present invention.
- the policy management apparatus 1 of the present invention may further include policy list display means 15.
- the policy list display unit 15 (for example, the policy list display unit 106) arranges the elements of the policy set that is the target of total ordering according to the policy order determined as the total order by the policy ordering unit 14 and displays the list. To do.
- the description order in a single ACL can be displayed in a list for each element of the policy set, so that policy verification by the policy manager can be supported.
- the policy management apparatus 1 of the present invention may further include an ACL generation means 16.
- the ACL generation unit 16 (for example, the ACL generation unit 108) converts each policy description included in the policy set to be fully ordered into an ACL description according to the policy order determined as the total order by the policy ordering unit. To do.
- a single ACL can be generated in the order of description according to the total order for a policy set having both positive policies and negative policies as elements. It is possible to appropriately implement access control in accordance with the policy defined in.
- one physically separated device has all the means as shown in FIGS. 19 and 20
- two or more physically separated devices as described above can be used. It is also possible to configure a policy management system by providing the means shown in FIGS.
- the policy management system includes a role storage device including role information storage means, a policy description storage device including policy description storage means, and a policy total ordering device including policy hierarchy means and policy ordering means. May be.
- the policy total ordering device may further include policy list display means or ACL generation means.
- load balancing can be achieved by providing a plurality of policy ordering devices in a large-scale environment where a large number of role information and / or policy descriptions exist.
- the present invention can also be applied to uses such as a policy search device that generates a search view according to a policy order for a policy in a database and a policy distribution device that sets a generated access control list in a remote server.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Automation & Control Theory (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
ある2つのポリシーp1,p2があり、それぞれに対応するサブジェクト集合をS1,S2とする。このとき、S1⊆S2のとき、かつそのときのみ、p1はp2を包含すると定義する。また、この包含関係をp1<p2と書く。
あるポリシー集合P={p1,p2,・・・,pN}が与えられたとき、次の性質を満たすPの要素の系列σをPの全順序と呼ぶ。
・(性質):「任意のPの要素pi,pjについて、pi<pjならば、必ずσ中でpiはpjよりも先に出現する。」
1.1.構成
以下、本発明の実施形態を図面を参照して説明する。図1は、本発明の第1の実施形態のポリシー管理システムの構成例を示すブロック図である。図1に示すポリシー管理システムは、アクセス制御ポリシー管理装置1を備える。アクセス制御ポリシー管理装置1は、中央処理装置(CPU)100を有するコンピュータであって、ポリシーデータベース(DB)102と、ロールDB101と、ポリシー階層化手段103と、ポリシー順序化手段104とを含む。なお、図1では、アクセス制御ポリシー管理装置1が上記構成要素を全て備える例を示しているが、例えば、ポリシーDB102やロールDB101が別装置(データベースシステム)として実装され、ネットワークを介して接続されているような構成であってもよい。
あるポリシー集合P={p1,p2,・・・,pN}が与えられたとき、Pの各要素をノードとしてもち、任意の要素pi、pjの間にpi<pjの関係があれば、piからpjに向かう有向リンクを付加した有向グラフを、ポリシー階層と呼ぶ。このとき、あるノードpに隣接するノード集合のうち、互いに有向リンクで接続されないノードの集合を層と呼ぶ。
次に、本実施形態の動作について説明する。図4は、本実施形態のポリシー管理システム(より具体的には、アクセス制御ポリシー管理装置1)の動作の一例を示すフローチャートである。
・(条件):当該ノードに出力リンクが一切ないか、あってもリンク先ノードの全てに訪問ずみフラグが付加されている。
以上のように生成されたリスト中のポリシーIDは、ポリシー階層データにおいて、対応するノードがNの要素から「深い層→浅い層」の順に整列されている。例えば、ノードn[j]からn[i]への有向パスが存在する場合、すなわちn[j]がn[i]よりもより深い層にある場合、かならずpid[j],pid[i]の順にリストに出現する。このとき、ステップA8~A11におけるポリシー階層データの生成方法から、pid[i]およびpid[j]に対応するサブジェクト集合は、かならずS[j]⊆S[i]の関係にあるため、pid[i]およびpid[j]に対応するポリシー記述間の包含関係が維持されるという効果が得られる。
以下、より具体的な例を用いて本実施形態の動作を説明する。まず、ロールDB101に格納されたサブジェクト集合として、「全社員」「経理部門」「人事部門」「総務部員」「経理・人事兼務者」の4つが格納されており、これら相互の包含関係が図7の通りであるとする。
・ポリシーID=p2:<経理部ポリシー>経理部ロールのユーザについて、経理部ファイルサーバへのアクセスを許可する。
・ポリシーID=p3:<人事部ポリシー>人事部ロールのユーザについて、人事部グループウェアサーバへのアクセスを許可する。
・ポリシーID=p4:<総務部ポリシー>総務部ロールのユーザについて、総務部ファイルサーバへのアクセスを許可する。
・ポリシーID=p5:<経理・人事兼務ポリシー>経理・人事兼務ロールのユーザについて、経理部ファイルサーバへのアクセスを禁止し、人事部グループウェアサーバへのアクセスを禁止する。
<p5,{jinji_hanako}>
<p4,{soumu_taro}>
<p3,{jinji_hanako,jinji_kyouko}>
<p2,{keiri_ichiro,keiri_jiro}>
<p1,{keiri_ichiro,keiri_jiro,jinji_hanako,jinji_kyouko,soumu_taro}>
例えば{keiri_ichiro,keiri_jiro}と{keiri_ichiro,keiri_jiro,jinji_hanako,jinji_kyouko,soumu_taro}の組み合わせの場合、前者のサブジェクト集合に対応するポリシーIDはp2であり、後者はp1であるので、ノードp2およびノードp1を生成して、ノードp2からノードp1へ向かう有向リンクを付与する(ステップA9)。
例えば{jinji_hanako,jinji_kyouko}と{jinji_hanako}の組み合わせの場合、前者のサブジェクト集合に対応するポリシーIDはp3であり、後者はp5であるので、ノードp3およびノードp5を生成して、ノードp5からノードp3へ向かう有向リンクを付与する(ステップA10)。ただし、ノードp3については、前段の動作で既に生成済みである場合には、重複したノードは生成しない。
例えば、{jinji_hanako,jinji_kyouko}と{soumu_taro}の組み合わせの場合、前者のサブジェクト集合に対応するポリシーIDはp3であり、後者はp4であるので、ノードp3およびノードp5を生成し、この間に一切の有向リンクを付与しない(ステップA11)。ただし、ノードp3については、前段の動作で既に生成済みである場合には、重複したノードは生成しない。
2.1.構成
次に、本発明の第2の実施形態について図面を参照して説明する。図10は、第2の実施形態のポリシー管理システムの構成例を示すブロック図である。図10に示すポリシー管理システムは、図1に示す第1の実施形態を基本とし、アクセス制御ポリシー管理装置1が、さらに、ACL生成条件入力手段107と、ACL生成手段108とを備える。
図11は、本実施形態のポリシー管理システム(より具体的には、アクセス制御ポリシー管理装置1)の動作の一例を示すフローチャートである。図11に示す例では、まず、ACL生成条件入力手段107が、ユーザ入力装置を介して、ポリシー配付条件(ACL生成条件ともいう。)の指示入力を受ける(ステップD1)。当該条件には、少なくともポリシー生成範囲が含まれる。ここで、ポリシー生成範囲については、例えば「ポリシーDBに格納された全てのポリシー」、「過去ACL生成が指示されていないポリシー」、「指定したロール集合に対応するポリシー」など、ポリシーDB102に格納されたポリシー記述の集合を特定できるものであれば、任意の条件を指示可能である。
・ロールIDの例:SELECT ポリシーID FROM ポリシーDB WHERE ロールID=(指定されたロールID[1]) OR ロールID=(指定されたロールID[2]) OR ・・・
(2)(sato,ファイル2,read-write)
(3)(suzuki,ファイル1,read-only)
(4)(suzuki,ファイル2,read-write)
(5)(tanaka,ファイル1,read-only)
(6)(tanaka,ファイル2,read-write)
(2)sato,ファイル2,read-write(改行記号)
(3)suzuki,ファイル1,read-only(改行記号)
(4)suzuki,ファイル2,read-write(改行記号)
(5)tanaka,ファイル1,read-only(改行記号)
(6)tanaka,ファイル2,read-write(改行記号)
以上のように、本実施形態によれば、ポリシー間の例外・原則関係について適切に、すなわち例外を優先して、ACL記述に変換できる。これは、ポリシー階層化手段103が、例外ポリシーをより深い層に配置して、ポリシー階層データを生成し、ポリシー順序化手段104が、当該ポリシー階層データのより深い層から浅い層に向けてポリシーIDを順序化し、当該順序に基づいてACL記述に変換するためである。
3.1.構成
次に、本発明の第3の実施形態について図面を参照して説明する。図14は、第3の実施形態のポリシー管理システムの構成例を示すブロック図である。図14に示すポリシー管理システムは、図1に示す第1の実施形態を基本とし、アクセス制御ポリシー管理装置1が、さらに、ポリシー表示条件入力手段105と、ポリシーリスト表示手段106とを備える。
図15は、本実施形態のポリシー管理システム(より具体的には、アクセス制御ポリシー管理装置1)の動作の一例を示すフローチャートである。図15に示す例では、まず、ポリシー表示条件入力手段105が、ユーザ入力装置を介して、表示条件の指示入力を受ける(ステップC1)。当該表示条件には、少なくともポリリー表示範囲と表示順序に関する条件が含まれる。ここで、ポリシー表示範囲については、例えば「ポリシーDBに格納された全てのポリシー」、「更新日時に関する期間」、「ポリシーを作成した管理者ID」など、ポリシーDB102に格納されたポリシー記述の集合を特定できるものであれば、任意の条件を指示可能である。また、表示順序については、例えば「ポリシー適用順」のほか、「ポリシー名称の辞書順」や「ポリシー更新日時順」などを指定できるようにしてもよい。
・管理者IDの例:SELECT ポリシーID FROM ポリシーDB WHERE 管理者ID=(指定された管理者ID)
以上のように、本実施形態によれば、ポリシー順序に従って一覧表示することで、アクセス制御ポリシー管理装置1のユーザであるポリシー管理者は、直観的にポリシーが適用される順序を認識でき、ポリシーの矛盾などを発見しやすくなる。例えば、ポリシー管理者は、自身が作成したポリシーよりも後に表示されるポリシー(すなわち、より優先度が低いポリシー)を検証するだけで、自身の作成したポリシーに矛盾し、かつ実際に適用される別のポリシーを発見できる。
Claims (14)
- ポリシーの適用対象となるサブジェクト集合を示す情報を含むロール情報と、前記ロール情報に含まれるサブジェクト集合間の包含関係を特定可能な情報とを格納するロール情報記憶手段と、
ポリシーを示す情報と、該ポリシーの適用対象となるサブジェクト集合を識別するための情報とを含むポリシー記述を格納するポリシー記述記憶手段と、
前記ポリシー記述記憶手段に格納されている2以上のポリシーについて、各ポリシーをノードとし、各ポリシーが適用されるサブジェクト集合の包含関係に基づいて、2以上のポリシーを階層化したポリシー階層を生成するポリシー階層化手段と、
前記ポリシー階層化手段によって生成されたポリシー階層を示す情報に基づいて、全順序化の対象である前記2以上のポリシーによるポリシー集合を、階層における上位・下位の関係を維持したまま、全順序化するポリシー順序化手段と、
を備えたことを特徴とするポリシー管理装置。 - ポリシー順序化手段によって全順序として決定されたポリシー順序にしたがって、全順序化の対象であるポリシー集合の要素を整列させて一覧表示するポリシーリスト表示手段を備えた請求項1に記載のポリシー管理装置。
- ポリシー順序化手段によって全順序として決定されたポリシー順序にしたがって、全順序化の対象であるポリシー集合に含まれる各ポリシー記述をACL記述に変換するACL生成手段を備えた請求項1または請求項2に記載のポリシー管理装置。
- ポリシー階層化手段は、サブジェクト集合に包含関係があるポリシーノード間に、有向リンクを付加したポリシー階層データを生成することによって、ポリシー階層を生成する請求項1から請求項3のうちのいずれか1項に記載のポリシー管理装置。
- ポリシー順序化手段は、入力リンクのないノードの集合の各要素を起点として、ポリシー階層データに対して、深さ優先探索に従い位相的ソートを行うことによって、全順序化の対象となったポリシー集合を全順序化する請求項4に記載のポリシー管理装置。
- ポリシーの適用対象となるサブジェクト集合を示す情報を含むロール情報と、前記ロール情報に含まれるサブジェクト集合間の包含関係を特定可能な情報とを格納するロール情報記憶手段を備えるロール記憶装置と、
ポリシーを示す情報と、該ポリシーの適用対象となるサブジェクト集合を識別するための情報とを含むポリシー記述を格納するポリシー記述記憶手段を備えるポリシー記述記憶装置と、
前記ポリシー記述記憶手段に格納されている2以上のポリシーについて、各ポリシーをノードとし、各ポリシーが適用されるサブジェクト集合の包含関係に基づいて、互いに包含関係をもたないサブジェクト集合に適用されるポリシーから構成される層を含むポリシー階層を生成するポリシー階層化手段と、
前記ポリシー階層化手段によって生成されたポリシー階層を示す情報に基づいて、異なる層のポリシー間の階層関係を維持したまま、全順序化の対象である前記2以上のポリシーによるポリシー集合を全順序化するポリシー順序化手段と、
を備えるポリシー全順序化装置と、
を有するポリシー管理システム。 - 前記ポリシー全順序化装置は、さらに、
ポリシー順序化手段によって全順序として決定されたポリシー順序にしたがって、全順序化の対象であるポリシー集合の要素を整列させて一覧表示するポリシーリスト表示手段を備えた請求項6に記載のポリシー管理システム。 - 前記ポリシー全順序化装置は、さらに、
ポリシー順序化手段によって全順序として決定されたポリシー順序にしたがって、全順序化の対象であるポリシー集合に含まれる各ポリシー記述をACL記述に変換するACL生成手段を備えた請求項6または請求項7に記載のポリシー管理システム。 - サブジェクト集合間の包含関係が特定可能な所与のサブジェクト集合および適用対象となるサブジェクト集合が示されたポリシー集合に対して、
前記ポリシー集合に含まれる2以上のポリシーについて、各ポリシーをノードとし、各ポリシーが適用されるサブジェクト集合の包含関係に基づいて、互いに包含関係をもたないサブジェクト集合に適用されるポリシーから構成される層を含むポリシー階層を生成するポリシー階層化ステップと、
前記ポリシー階層化ステップで生成されたポリシー階層を示す情報に基づいて、異なる層のポリシー間の階層関係を維持したまま、全順序化の対象である前記2以上のポリシーによるポリシー集合を全順序化するポリシー順序化ステップと、
を含むことを特徴とするポリシー順序化方法。 - サブジェクト集合間の包含関係が特定可能な所与のサブジェクト集合および適用対象となるサブジェクト集合が示されたポリシー集合に対して、
前記ポリシー集合に含まれる2以上のポリシーについて、各ポリシーをノードとし、各ポリシーが適用されるサブジェクト集合の包含関係に基づいて、互いに包含関係をもたないサブジェクト集合に適用されるポリシーから構成される層を含むポリシー階層を生成するポリシー階層化ステップと、
前記ポリシー階層化ステップで生成されたポリシー階層を示す情報に基づいて、異なる層のポリシー間の階層関係を維持したまま、全順序化の対象である前記2以上のポリシーによるポリシー集合を全順序化するポリシー順序化ステップと、
前記ポリシー順序化ステップで全順序として決定されたポリシー順序にしたがって、全順序化の対象であるポリシー集合の要素を整列させて一覧表示する一覧表示ステップと、
を含むことを特徴とするポリシーリスト表示方法。 - サブジェクト集合間の包含関係が特定可能な所与のサブジェクト集合および適用対象となるサブジェクト集合が示されたポリシー集合に対して、
前記ポリシー集合に含まれる2以上のポリシーについて、各ポリシーをノードとし、各ポリシーが適用されるサブジェクト集合の包含関係に基づいて、互いに包含関係をもたないサブジェクト集合に適用されるポリシーから構成される層を含むポリシー階層を生成するポリシー階層化ステップと、
前記ポリシー階層化ステップで生成されたポリシー階層を示す情報に基づいて、異なる層のポリシー間の階層関係を維持したまま、全順序化の対象である前記2以上のポリシーによるポリシー集合を全順序化するポリシー順序化ステップと、
前記ポリシー順序化ステップで全順序として決定されたポリシー順序にしたがって、全順序化の対象であるポリシー集合に含まれる各ポリシー記述をACL記述に変換するACL生成ステップと、
を含むことを特徴とするACL生成方法。 - コンピュータに、
サブジェクト集合間の包含関係が特定可能な所与のサブジェクト集合および適用対象となるサブジェクト集合が示されたポリシー集合に対して、
前記ポリシー集合に含まれる2以上のポリシーについて、各ポリシーをノードとし、各ポリシーが適用されるサブジェクト集合の包含関係に基づいて、互いに包含関係をもたないサブジェクト集合に適用されるポリシーから構成される層を含むポリシー階層を生成するポリシー階層化処理と、
前記ポリシー階層化処理で生成されたポリシー階層を示す情報に基づいて、異なる層のポリシー間の階層関係を維持したまま、全順序化の対象である前記2以上のポリシーによるポリシー集合を全順序化するポリシー順序化処理と、
を実行させるためのポリシー順序化プログラム。 - コンピュータに、
サブジェクト集合間の包含関係が特定可能な所与のサブジェクト集合および適用対象となるサブジェクト集合が示されたポリシー集合に対して、
前記ポリシー集合に含まれる2以上のポリシーについて、各ポリシーをノードとし、各ポリシーが適用されるサブジェクト集合の包含関係に基づいて、互いに包含関係をもたないサブジェクト集合に適用されるポリシーから構成される層を含むポリシー階層を生成するポリシー階層化処理と、
前記ポリシー階層化処理で生成されたポリシー階層を示す情報に基づいて、異なる層のポリシー間の階層関係を維持したまま、全順序化の対象である前記2以上のポリシーによるポリシー集合を全順序化するポリシー順序化処理と、
前記ポリシー順序化処理で全順序として決定されたポリシー順序にしたがって、全順序化の対象であるポリシー集合の要素を整列させて一覧表示する一覧表示処理と、
を実行させるためのポリシーリスト表示プログラム。 - コンピュータに、
サブジェクト集合間の包含関係が特定可能な所与のサブジェクト集合および適用対象となるサブジェクト集合が示されたポリシー集合に対して、
前記ポリシー集合に含まれる2以上のポリシーについて、各ポリシーをノードとし、各ポリシーが適用されるサブジェクト集合の包含関係に基づいて、互いに包含関係をもたないサブジェクト集合に適用されるポリシーから構成される層を含むポリシー階層を生成するポリシー階層化処理と、
前記ポリシー階層化処理で生成されたポリシー階層を示す情報に基づいて、異なる層のポリシー間の階層関係を維持したまま、全順序化の対象である前記2以上のポリシーによるポリシー集合を全順序化するポリシー順序化処理と、
前記ポリシー順序化ステップで全順序として決定されたポリシー順序にしたがって、全順序化の対象であるポリシー集合に含まれる各ポリシー記述をACL記述に変換するACL生成処理と、
を実行させるためのACL生成プログラム。
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/144,829 US8875221B2 (en) | 2009-02-10 | 2010-01-26 | Policy management apparatus, policy management system, and method and program used for the same |
JP2010550432A JP5482667B2 (ja) | 2009-02-10 | 2010-01-26 | ポリシー管理装置、ポリシー管理システム、それに用いる方法およびプログラム |
KR1020117018538A KR101294951B1 (ko) | 2009-02-10 | 2010-01-26 | 폴리시 관리 장치, 폴리시 관리 시스템, 그것에 이용하는 방법 및 정보 저장 매체 |
EP10741035A EP2378458A4 (en) | 2009-02-10 | 2010-01-26 | POLICY MANAGEMENT DEVICE, POLICY MANAGEMENT SYSTEM, AND METHOD AND PROGRAM USED FOR THE DEVICE AND SYSTEM |
CN2010800070998A CN102308302A (zh) | 2009-02-10 | 2010-01-26 | 策略管理设备、策略管理系统和用于策略管理的方法和程序 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2009-028985 | 2009-02-10 | ||
JP2009028985 | 2009-02-10 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2010092755A1 true WO2010092755A1 (ja) | 2010-08-19 |
Family
ID=42561604
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2010/000414 WO2010092755A1 (ja) | 2009-02-10 | 2010-01-26 | ポリシー管理装置、ポリシー管理システム、それに用いる方法およびプログラム |
Country Status (6)
Country | Link |
---|---|
US (1) | US8875221B2 (ja) |
EP (1) | EP2378458A4 (ja) |
JP (1) | JP5482667B2 (ja) |
KR (1) | KR101294951B1 (ja) |
CN (1) | CN102308302A (ja) |
WO (1) | WO2010092755A1 (ja) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012039081A1 (ja) * | 2010-09-22 | 2012-03-29 | 日本電気株式会社 | アクセス権可否生成装置、アクセス権可否生成方法、プログラム、及び、アクセス制御システム |
CN103597445A (zh) * | 2011-06-16 | 2014-02-19 | 惠普发展公司,有限责任合伙企业 | 用于策略生成的系统和方法 |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10015286B1 (en) | 2010-06-23 | 2018-07-03 | F5 Networks, Inc. | System and method for proxying HTTP single sign on across network domains |
US9178910B2 (en) * | 2010-12-24 | 2015-11-03 | Nec Corporation | Communication system, control apparatus, policy management apparatus, communication method, and program |
US9081975B2 (en) * | 2012-10-22 | 2015-07-14 | Palantir Technologies, Inc. | Sharing information between nexuses that use different classification schemes for information access control |
CN104714825B (zh) * | 2015-03-20 | 2019-01-04 | 北京瑞星网安技术股份有限公司 | 统一策略配置的方法 |
US11763321B2 (en) | 2018-09-07 | 2023-09-19 | Moore And Gasperecz Global, Inc. | Systems and methods for extracting requirements from regulatory content |
JP7326930B2 (ja) * | 2019-07-01 | 2023-08-16 | 富士通株式会社 | 探索プログラム、探索方法、および、情報処理装置 |
US11314922B1 (en) * | 2020-11-27 | 2022-04-26 | Moore & Gasperecz Global Inc. | System and method for generating regulatory content requirement descriptions |
US11823477B1 (en) | 2022-08-30 | 2023-11-21 | Moore And Gasperecz Global, Inc. | Method and system for extracting data from tables within regulatory content |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004280727A (ja) * | 2003-03-18 | 2004-10-07 | Ricoh Co Ltd | 電子掲示板システム |
JP2007249617A (ja) * | 2006-03-16 | 2007-09-27 | Yaskawa Electric Corp | ファイルサーバシステム |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2001294089A1 (en) * | 2000-08-18 | 2002-02-25 | Camelot Information Technologies Ltd. | A system and method for a greedy pairwise clustering |
US20040039594A1 (en) * | 2002-01-09 | 2004-02-26 | Innerpresence Networks, Inc. | Systems and methods for dynamically generating licenses in a rights management system |
US8595347B2 (en) * | 2004-09-30 | 2013-11-26 | Cisco Technology, Inc. | Method and apparatus for device based policy configuration in a network |
JP4301513B2 (ja) | 2004-11-26 | 2009-07-22 | インターナショナル・ビジネス・マシーンズ・コーポレーション | ポリシーを用いたアクセス制御効果の判定方法 |
US8056114B2 (en) * | 2005-08-23 | 2011-11-08 | The Boeing Company | Implementing access control policies across dissimilar access control platforms |
US7913529B2 (en) * | 2007-08-28 | 2011-03-29 | Cisco Technology, Inc. | Centralized TCP termination with multi-service chaining |
US20090178102A1 (en) * | 2008-01-04 | 2009-07-09 | Khaled Alghathbar | Implementing Security Policies in Software Development Tools |
JP5083042B2 (ja) * | 2008-05-30 | 2012-11-28 | 富士通株式会社 | アクセス制御ポリシーの遵守チェック用プログラム |
US20100299717A1 (en) * | 2009-05-22 | 2010-11-25 | National University Of Ireland, Galway | System for Annotation-Based Access Control |
US9477671B2 (en) * | 2009-05-27 | 2016-10-25 | Oracle International Corporation | System and method for implementing effective date constraints in a role hierarchy |
US9268954B2 (en) * | 2009-10-07 | 2016-02-23 | Ca, Inc. | System and method for role discovery |
-
2010
- 2010-01-26 KR KR1020117018538A patent/KR101294951B1/ko not_active IP Right Cessation
- 2010-01-26 JP JP2010550432A patent/JP5482667B2/ja active Active
- 2010-01-26 WO PCT/JP2010/000414 patent/WO2010092755A1/ja active Application Filing
- 2010-01-26 EP EP10741035A patent/EP2378458A4/en not_active Withdrawn
- 2010-01-26 CN CN2010800070998A patent/CN102308302A/zh active Pending
- 2010-01-26 US US13/144,829 patent/US8875221B2/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004280727A (ja) * | 2003-03-18 | 2004-10-07 | Ricoh Co Ltd | 電子掲示板システム |
JP2007249617A (ja) * | 2006-03-16 | 2007-09-27 | Yaskawa Electric Corp | ファイルサーバシステム |
Non-Patent Citations (2)
Title |
---|
HIROSHI NAGASE: "Kaisoteki Security Level no Jiyudo o Mochiita Access-ken Setteiho", TRANSACTIONS OF INFORMATION PROCESSING SOCIETY OF JAPAN, vol. 41, no. 8, 15 August 2000 (2000-08-15), pages 2255 - 2263, XP003000558 * |
See also references of EP2378458A4 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012039081A1 (ja) * | 2010-09-22 | 2012-03-29 | 日本電気株式会社 | アクセス権可否生成装置、アクセス権可否生成方法、プログラム、及び、アクセス制御システム |
JP5807640B2 (ja) * | 2010-09-22 | 2015-11-10 | 日本電気株式会社 | アクセス権可否生成装置、アクセス権可否生成方法、プログラム、及び、アクセス制御システム |
US9256716B2 (en) | 2010-09-22 | 2016-02-09 | Nec Corporation | Access authority generation device |
CN103597445A (zh) * | 2011-06-16 | 2014-02-19 | 惠普发展公司,有限责任合伙企业 | 用于策略生成的系统和方法 |
EP2721485A1 (en) * | 2011-06-16 | 2014-04-23 | Hewlett-Packard Development Company, L.P. | System and method for policy generation |
JP2014519131A (ja) * | 2011-06-16 | 2014-08-07 | ヒューレット−パッカード デベロップメント カンパニー エル.ピー. | ポリシー生成システム及び方法 |
EP2721485A4 (en) * | 2011-06-16 | 2014-12-10 | Hewlett Packard Development Co | SYSTEM AND METHOD FOR GENERATING POLICY |
US10536483B2 (en) | 2011-06-16 | 2020-01-14 | Hewlett Packard Enterprise Development Lp | System and method for policy generation |
Also Published As
Publication number | Publication date |
---|---|
JP5482667B2 (ja) | 2014-05-07 |
EP2378458A1 (en) | 2011-10-19 |
JPWO2010092755A1 (ja) | 2012-08-16 |
US20110289550A1 (en) | 2011-11-24 |
EP2378458A4 (en) | 2013-01-09 |
CN102308302A (zh) | 2012-01-04 |
KR20110101249A (ko) | 2011-09-15 |
US8875221B2 (en) | 2014-10-28 |
KR101294951B1 (ko) | 2013-08-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5482667B2 (ja) | ポリシー管理装置、ポリシー管理システム、それに用いる方法およびプログラム | |
US20220215125A1 (en) | Viewing, selecting, and triggering a data pipeline to derive a collaborative dataset | |
US7584417B2 (en) | Role-dependent action for an electronic form | |
US7620647B2 (en) | Hierarchy global management system and user interface | |
US8464206B2 (en) | Method and system for managing enterprise content | |
US11356456B2 (en) | Multi-participant and cross-environment pipelines | |
US8301606B2 (en) | Data management method and apparatus | |
US20060107224A1 (en) | Building a dynamic action for an electronic form | |
WO2012135737A2 (en) | Rules execution platform system and method | |
US20220198298A1 (en) | Curated machine learning workflow suggestions and clustering techniques | |
Villazon-Terrazas et al. | Construction of enterprise knowledge graphs (I) | |
Paschke et al. | Tutorial on advanced design patterns in event processing | |
McGinnes et al. | Conceptual independence: A design principle for the construction of adaptive information systems | |
Baumgrass et al. | Deriving role engineering artifacts from business processes and scenario models | |
Fürber et al. | Data quality | |
US10303668B2 (en) | Automatic screen generation device, automatic screen generation program, and automatic screen generation method | |
Baumgrass et al. | Bridging the gap between role mining and role engineering via migration guides | |
US8744895B2 (en) | Method and system for managing a plurality of regulations, policies and risks | |
Conrad | Microsoft Access 2013 inside out | |
Mohamed et al. | Authorization and access control for different database models: Requirements and current state of the art | |
Mohamed et al. | Authorization policy extension for graph databases | |
JP2022050169A (ja) | 情報処理システム及びプログラム | |
Nasu et al. | Efficient Row Pattern Matching Using Pattern Hierarchies for Sequence OLAP | |
Domingues | Authenticus: architecture and mechanisms to support a national repository of scientific publications | |
Bäuerle et al. | Humboldt: Metadata-Driven Extensible Data Discovery |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 201080007099.8 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10741035 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2010741035 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 13144829 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2010550432 Country of ref document: JP |
|
ENP | Entry into the national phase |
Ref document number: 20117018538 Country of ref document: KR Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |