WO2014119233A1 - ネットワークシステム - Google Patents
ネットワークシステム Download PDFInfo
- Publication number
- WO2014119233A1 WO2014119233A1 PCT/JP2014/000142 JP2014000142W WO2014119233A1 WO 2014119233 A1 WO2014119233 A1 WO 2014119233A1 JP 2014000142 W JP2014000142 W JP 2014000142W WO 2014119233 A1 WO2014119233 A1 WO 2014119233A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- account
- node
- access control
- recorded
- control list
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
- H04L47/80—Actions related to the user profile or the type of traffic
- H04L47/808—User-type aware
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/2866—Architectures; Arrangements
- H04L67/30—Profiles
- H04L67/306—User profiles
Definitions
- the present invention relates to a network system such as a work group in which each node individually manages a user account, its node, its access control list changing method, and a program.
- a large-scale network system with a large number of nodes generally includes a plurality of domains, each of which includes a domain controller that centrally manages user accounts. By providing a domain controller, a large-scale network system can be managed and operated efficiently and safely.
- a small network system such as a work group with a small number of nodes generally does not include a domain controller, and manages individual user accounts on individual nodes. That is, in a network system that does not include a domain controller (sometimes referred to as an individual management network system), the user needs to create his / her own account for each node that he / she wishes to access (see, for example, Patent Document 1). .
- a user inputs an account creation request including an account name and a password for each node that desires access, and an account name, an account ID, and It is necessary to record account information consisting of passwords.
- the account name is a character string used by a person to identify the account.
- the account ID is an identifier used by the node to uniquely identify the account, and is uniquely generated at each node.
- the account ID is sometimes called a security identifier (SID; Security Identifier).
- SID security identifier
- each node generates an account ID independently, so that the account ID generated at each node is not necessarily the same. Absent.
- the account information registered as described above is used for authentication processing.
- an authentication request including an account name and password is sent from the node used by the user, the node compares the registered account information with the information sent from the terminal device, and if the verification is successful, Allow access to the local node.
- An access control list of an object includes an access control entry (ACE; Access ⁇ ⁇ Control Entry) in which the account ID and access authority of an account that permits access to the object are recorded. If there is an access request for an object from an account having a certain account ID (for example, IDX), is an access control entry in which the account ID “IDX” is recorded included in the access control list for the object? If it is not included, access is denied. If it is included, it is further determined whether or not to permit access based on the access authority recorded in association with the account ID “IDX” and the content of the access request.
- each node independently generates an account ID for identifying an account.
- an access request source Are identified by an account ID. Therefore, in an individual management network system that performs access control using an access control list, changing the access control list of an object that can be accessed from multiple nodes using the same account name is cumbersome. There is a problem of becoming. This problem will be described by taking the network system of FIG. 16 as an example.
- the network system in FIG. 16 includes a plurality of nodes N1 to N3 and a shared storage device ST shared by the nodes N1 and N2.
- a file F that can be accessed from the node N1 and the node N2 by the user U of the node N3 using the account name “XYZ” is recorded.
- the file F includes an access control list ACL and a file body FH.
- an access control entry ACE1 in which an account ID “IDN1” and an access authority “ALL” uniquely generated by the node N1 when an account with the account name “XYZ” is created in the node N1 is recorded.
- an access control entry ACE2 in which the account ID “IDN2” and the access authority “ALL” that are uniquely generated by the node N2 when the account with the same account name “XYZ” is created in the node N2 are included. .
- the account information generated when the account creation request including the account name “XYZ” and the password “P” is sent from the node N3 is recorded.
- This account information includes an account name “XYZ” and a password “P” included in the account creation request, and an account ID “IDN1” uniquely generated by the own node N1.
- the account information generated when the account creation request including the account name “XYZ” and the password “P” is sent from the node N3 is recorded.
- This account information includes an account name “XYZ” and a password “P” included in the account creation request, and an account ID “IDN2” uniquely generated by the own node N2.
- the node N3 When the user U of the node N3 accesses the file F from the node N1 using the account name “XYZ”, the node N3 transmits an access request including the account name “XYZ” and access contents to the node N1. .
- the node N1 searches the account information storage unit SA for the account ID “IDN1” recorded in association with the account name “XYZ”.
- the account ID “IDN1” is searched because the access control list ACL manages an account (user) that can access the object (in this case, the file F) by the account ID.
- the node N1 checks whether or not the access control entry ACL in which the account ID “IDN1” is recorded is included in the access control list ACL of the file F.
- the node N1 since there is an access control entry ACE1 in which the account ID “IDN1” is recorded, the node N1 is a file based on the access authority recorded in the access control entry ACE1 and the access content in the access request. It is determined whether or not access to F is permitted. In this example, since the access authority recorded in the access control entry ACE1 is “ALL”, the user U is permitted to access the file F.
- the node N3 transmits an access request including the account name “XYZ” and access contents to the node N2. To do. As a result, processing similar to the processing performed at the node N1 described above is performed at the node N2, and access to the file F is permitted.
- the user U of the node N3 sends the identification information of the object (file F in this example) whose access control list is to be changed from the node N3 to the node N1, and the account name (for example, “XYZ”) and the change contents (for example, the access authority is changed to “WRITE”) are transmitted.
- the node N1 searches the account information storage unit SA for the account ID “IDN1” recorded in association with the account name “XYZ”. Thereafter, the node N1 changes the access authority in the access control entry ACE1 in which the searched account ID “IDN1” is recorded from “ALL” to “WRITE”. If this is the case, the access authority between the user U accessing the file F from the node N1 using the account name “XYZ” and the user U accessing the file F from the node N2 using the same account name “XYZ”. Will be different.
- the user U transmits an access control list change request having the same content as the access control list change request described above to the node N2.
- processing similar to that described above is performed at the node N2, and the access authority in the access control entry ACE2 is changed from “ALL” to “WRITE”.
- the access control list change request in order to make the access authority when accessed from the node N1 and the access authority when accessed from the node N2, the access control list change request must be transmitted to the node N1 and the node N2. Therefore, the operation of changing the access control list becomes troublesome.
- the number of transmissions of the access control list change request is two because the nodes N1 and N2 can access the file F using the same account name “XYZ”. When there are N access nodes in file F using the same account name “XYZ”, the access control list change request transmission work must be performed N times.
- an object of the present invention is that, in a network system that does not include a domain controller, when changing the access control list of an object that can be accessed from a plurality of nodes using the same account name, the change work becomes troublesome. It is to provide a network system that solves this problem.
- the network system includes: An account ID of an account that is an access control list for each object shared by the first node, the second node, the first node, and the second node, and that allows access to the object And an access control list including an access control entry in which the access authority is recorded,
- the first node is: An account correspondence table in which the account name and account ID of the account created in the own node are recorded in association with each other, and the account name and account ID of the account created in the second node are recorded in association with each other;
- the access control list change request including the identification information of the object whose access control list is to be changed, the account name of the account whose access control entry is to be changed, and the change contents
- the access control list change request from the account correspondence table An account ID recorded in association with the account name in the access, and an access control entry in which the searched account ID is recorded, and is included in the access control list of the object indicated by the identification information
- An access control list changing unit for changing the control entry according to the change contents.
- the node according to the present invention is: An account correspondence table in which the account name and account ID of the account created in the own node are recorded in association with each other, and the account name and account ID of the account created in the other node are recorded in association with each other; An access control list change request including identification information of an object whose access control list is to be changed, an account name of an account whose access control entry is to be changed, and a change content among objects shared by the own node and the other node
- an account ID recorded in association with the account name in the access control list change request is searched from the account correspondence table, and the searched account ID and access authority are recorded in the access control entry
- an access control list changing unit that changes an access control entry included in the access control list of the object indicated by the identification information in accordance with the change contents.
- An access control list changing method includes: An account ID of an account that is an access control list for each object shared by the first node, the second node, the first node, and the second node, and that allows access to the object And an access control list changing method in a network system comprising an access control list including an access control entry in which an access right is recorded,
- the first node creates in its own node in response to an access control list change request including the identification information of the object whose access control list is to be changed, the account name of the account whose access control entry is to be changed, and the change contents
- the access control list is changed from the account correspondence table in which the account name and account ID of the account created are recorded in association with each other and the account name and account ID of the account created in the second node are recorded in association with each other.
- An account ID recorded in association with the requesting account name is searched, and the searched account ID is recorded, and is included in the access control list of the object indicated by the identification information Change the access control entry according to the change That.
- the program according to the present invention is: A computer having an account correspondence table in which the account name and account ID of an account created on its own computer are recorded in association with each other, and the account name and account ID of an account created on another computer are recorded in association with each other.
- An access control list change request including identification information of an object whose access control list is to be changed, an account name of an account whose access control entry is to be changed, and change contents among objects shared by the local computer and the other computer
- an account ID recorded in association with the account name in the access control list change request is searched from the account correspondence table, and the searched account ID and access authority are recorded in the access control entry
- the access control entry included in the access control list of the object indicated by the identification information is made to function as an access control list changing unit that changes according to the change contents.
- the network system functions as a node, nodes 1 and 2 functioning as file servers, a shared storage device 3 accessible from nodes 1 and 2, and a client.
- Nodes 4 and 5 are provided, and the servers 1, 2, 4, and 5 are connected to each other via a network NW.
- NW a network NW.
- the nodes 4 and 5 functioning as clients access the files 31-1 to 31-N on the shared storage device 3, if the node 1 is operating normally, If the node 1 is accessed and a failure occurs in the node 1, the node 2 is accessed.
- the file 31-i (1 ⁇ i ⁇ N) on the shared storage device 3 is composed of file metadata 311, an access control list 312, and a file body 313 as shown in FIG.
- the file metadata 311 includes a file creation date, a file creator account name, a file name, and the like.
- the nodes 1 and 2 functioning as file servers include transmission / reception units 11 and 21, control units 12 and 22, storage devices 13 and 23, input units 14 and 24 such as a keyboard, and display unit 15 such as an LCD. 25.
- the storage devices 13 and 23 in the nodes 1 and 2 are provided with account information storage units 131 and 231 and account correspondence table storage units 132 and 232, respectively.
- account information including the account name, account ID, and password of the account created in the own node 1 is recorded. Further, in the account information storage unit 231 in the node 2, account information including the account name, account ID, and password of the account created in the own node 2 is recorded.
- 3A and 3B are diagrams showing examples of contents of the account information storage units 131 and 231, respectively.
- the account correspondence table storage unit 132 in the node 1 In the account correspondence table storage unit 132 in the node 1, the account name and account ID of the account created in the own node 1 are recorded in association with each other, and the account name and account ID of the account created in the other node 2 are recorded. The account correspondence table recorded in association with is recorded. Further, in the account correspondence table storage unit 232 in the node 2, the account name and account ID of the account created in the own node 2 are recorded in association with each other, and the account name of the account created in the other node 1 is recorded. An account correspondence table recorded in association with the account ID is recorded. 4A and 4B are diagrams showing examples of contents of the account correspondence table storage units 132 and 232, respectively.
- the transmission / reception units 11 and 21 in the nodes 1 and 2 each have a function of transmitting and receiving data via the network NW.
- the control units 12 and 22 in the nodes 1 and 2 include account management units 121 and 221, account correspondence table management units 122 and 222, authentication units 123 and 223, and file systems 124 and 224, respectively.
- the account management unit 121 in the node 1 A function for generating an account ID for uniquely identifying the account information, and a function for recording the account information including the generated account ID and the account name and password in the account creation request in the account information storage unit 131. Further, the account management unit 121 has a function of passing an account correspondence table registration request including the generated account ID and the account name in the account creation request to the account correspondence table management unit 122 in the own node 1, and the account correspondence It has a function of transmitting a table registration request to another node 2.
- the account management unit 121 when an account creation request that does not include a password is sent, the account management unit 121 generates an account ID that uniquely identifies the account, and the account ID and the account name in the account creation request Is stored in the account information storage unit 131.
- the account management unit 221 in the node 2 responds to the account creation request including the account name and password of the account to be created sent from the node 4 or the node 5 functioning as a client. It has a function of generating an account ID for uniquely identifying the account, and a function of recording account information including the generated account ID and the account name and password in the account creation request in the account information storage unit 231. Further, the account management unit 221 has a function of passing an account correspondence table registration request including the generated account ID and the account name in the account creation request to the account correspondence table management unit 222 in the own node 2, and the account correspondence It has a function of transmitting a table registration request to another node 1.
- the account correspondence table management unit 122 in the node 1 associates the account name and account ID included in the account correspondence table registration request passed from the account management unit 121 in the own node 1 and associates the account correspondence table storage unit 132 with the account name. And the function of recording the account name and account ID included in the account correspondence table registration request sent from the other node 2 in association with each other in the account correspondence table storage unit 132.
- the account correspondence table management unit 222 in the node 2 associates the account name and account ID included in the account correspondence table registration request passed from the account management unit 221 in the own node 2 and stores the account correspondence table.
- the account information storage units of the own nodes 1 and 2 It has a function of permitting the use of the file systems 124 and 224 when collation is successful with the account information recorded in 131 and 231.
- the file systems 124 and 224 in the nodes 1 and 2 include access control units 125 and 225 and file registration units 127 and 227, respectively.
- the access control units 125 and 225 are respectively access control list change units (ACL change units). ) 126, 226.
- the access control unit 125 in the node 1 has the following functions (1) to (4).
- a function of determining whether or not to permit file access by referring to an access control list of a file to be accessed when a file access request is sent from the node 4 or the node 5 functioning as a client. This function is described in detail as follows.
- the file access request includes an access target for only a file body, an access control list for only an access control list, and an access target for both a file body and an access control list.
- the file access request for accessing only the file main body includes the file name 51 of the file to be accessed and the account name of the account used when accessing the file with the file name 51. 52 and access contents (WRITE, READ, etc.) 53 for the file body.
- the file access request for accessing only the access control list includes the file name of the file to be accessed (file name of the file whose access control list is to be changed) 51 and the file name.
- the account name 52 of the account used when accessing the file 51, the account name 54 of the account whose access control entry is to be changed, and the change contents 55 to the access control list are included.
- the contents of changes to the access control list include not only access authority changes, but also additions and deletions of access control entries.
- the file access request for accessing both the file body and the access control list is performed when accessing the file name 51 of the file to be accessed and the file of this file name 51.
- the account name 52 of the account used for the access, the access content 53 for the file body, the account name 54 of the account for changing the access control entry, and the change content 55 for the access control list are included.
- the access control unit 125 first records the account recorded in association with the account name 52.
- the ID is searched from the account information storage unit 131, and it is checked whether or not the searched account ID is included in the access control list of the file indicated by the file name 51. If not, access is denied. If it is included, it is further determined whether or not to permit access based on the access authority and the access content 53 recorded in association with the searched account ID.
- processing other than the processing when the searched account ID is included in the access control list of the access target file is performed. The same processing as described above is performed. If the searched account ID is included in the access control list, it is determined whether or not to permit access based on the access authority recorded in association with the account ID and the change content 55.
- the file access request is the one shown in FIG. 5C in which both the file body and the access control list are to be accessed
- processing other than the processing when the searched account ID is included in the access control list is included in the access control list.
- the same processing as described above is performed. If the searched account ID is included in the access control list, whether to permit access based on the access authority recorded in association with the account ID, the access content 53, and the change content 55 is determined. judge. That is, if the recorded access authority can perform both the process indicated by the access content 53 and the process indicated by the change content 55, the access is permitted, and otherwise, the access is denied.
- the above is the detail of the function shown in (1).
- the access control list changing unit (ACL changing unit) 126 is called to execute the access control list changing process. And a function to return the processing result to the request source.
- the access control list changing unit 126 is indicated by a function for searching all account IDs recorded in association with the account name 54 from the account correspondence table recorded in the account correspondence table storage unit 132, or by the file name 51.
- the access control entry in which the searched account ID is recorded is changed according to the change contents 55.
- the change content 55 is addition of an access control entry, an access control entry in which the account ID and the access authority are recorded is created on the access control list for each searched account ID.
- the access authority is included in the change content 55.
- the above is the function of the access control unit 125.
- the access control unit 225 in the node 2 also has the same function as the access control unit 125.
- the file registration unit 127 in the node 1 uses the file metadata 311 (see FIG. 2) of the file to be registered as the account name of the file creator. For each of the account IDs recorded in association with the extracted account names from the account correspondence table recorded in the account correspondence table storage unit 132, A function of creating on the access control list 312 an access control entry in which an account ID and a predetermined access right for a file creator (for example, ALL) are recorded. Also, the file registration unit 227 in the node 2 has the same function as the file registration unit 127.
- the node 1 can be realized by a computer.
- the node 1 When the node 1 is realized by a computer, for example, the following is performed.
- a disk, a semiconductor memory, and other recording media recording programs for causing the computer to function as the account management unit 121, the account correspondence table management unit 122, the authentication unit 123, and the file system 124 are prepared. Let me read.
- the computer implements an account management unit 121, an account correspondence table management unit 122, an authentication unit 123, and a file system 124 on its own computer by controlling its own operation according to the read program.
- the node 2 can be realized by a computer.
- the node 4 functioning as a client includes a transmission / reception unit 41, a control unit 42, an input unit 43 such as a keyboard, and a display unit 44 such as an LCD.
- the transmission / reception unit 41 has a function of transmitting / receiving data via the network NW.
- the control unit 42 includes an account creation request unit 421, an authentication request unit 422, a file registration unit 423, and a file access unit 424.
- the account creation request unit 421 has a function of creating an account creation request including an account name and a password in accordance with an instruction from the user U4 and transmitting it to the node designated by the user U4.
- the authentication request unit 422 has a function of transmitting an authentication request including an account name and a password to the node 1 in accordance with an instruction from the user U4. However, when a failure occurs in the node 1, the authentication request unit 422 transmits an authentication request to the node 2.
- the file registration request unit 423 has a function of transmitting a file registration request including a registration target file to the node 1 in accordance with an instruction from the user U4. However, if a failure has occurred in the node 1, the file registration request unit 423 transmits a file registration request to the node 2.
- the file access unit 424 has a function of transmitting a file access request shown in FIG. 5A, FIG. 5B, or FIG. 5C to the node 1 in accordance with an instruction from the user U4. However, if a failure has occurred in the node 1, the file access unit 424 transmits a file access request to the node 2.
- a determination method for determining whether or not a failure has occurred in the node for example, a method for determining that a failure has occurred in the node 1 when a request for the node 1 has failed continuously a predetermined number of times.
- a method of determining that a failure has occurred in the node 1 can be employed.
- the node 5 has the same configuration as the node 4.
- the node 4 can be realized by a computer.
- the node 4 is realized by a computer, for example, the following is performed.
- the computer In order to make the computer function as the account creation request unit 421, the authentication request unit 422, the file registration unit 423, and the file access unit 424, a disk, a semiconductor memory, and other recording media on which a program is recorded are prepared. Let me read.
- the computer realizes an account creation request unit 421, an authentication request unit 422, a file registration unit 423, and a file access unit 424 on its own computer by controlling its own operation according to the read program.
- the user U4 inputs an account creation instruction including the account name “A”, the password “PA”, and the transmission destination “node 1” from the input unit 43 of the node 4. Accordingly, the account creation request unit 421 transmits an account creation request including the account name “A” and the password “PA” to the node 1 (step S701 in FIG. 7).
- the account management unit 121 in the node 1 When an account creation request is sent, the account management unit 121 in the node 1 generates an account ID “IDA1” for uniquely identifying the account in the own node 1 (steps S702 in FIG. 7 and FIG. 8). Step S81). After that, the account management unit 121 generates account information including the generated account ID “IDA1”, the account name “A” and the password “PA” in the account creation request, and records them in the account information storage unit 131 ( Step S703 in FIG. 7 and Steps S82 and S83 in FIG. 8).
- the account management unit 121 passes an account correspondence table registration request including the account name “A” and the account ID “IDA1” to the account correspondence table management unit 122 (step S84 in FIG. 8). Thereby, the account correspondence table management unit 122 records the account name “A” and the account ID “IDA1” in the account correspondence table storage unit 132 in association with each other (step S704 in FIG. 7).
- the account management unit 121 transmits an account correspondence table registration request including the account name “A” and the account ID “IDA1” to the node 2 (step S705 in FIG. 7 and step S85 in FIG. 8).
- the account correspondence table management unit 222 in the node 2 receives the account correspondence table registration request from the node 1, the account correspondence table storage unit 132 associates the account name “A” with the account ID “IDA1”. (Step S706 in FIG. 7).
- the user U4 of the node 4 creates an account with the account name “A” in the node 2, so the account name “A”, the password “PA”, and the transmission destination “node 2” are input from the input unit 43. Enter the account creation instructions.
- the account creation request unit 421 transmits an account creation request including the account name “A” and the password “PA” to the node 2 (step S707 in FIG. 7).
- the account management unit 221 in the node 2 When an account creation request is sent, the account management unit 221 in the node 2 generates an account ID “IDA2” for uniquely identifying the account in the own node 2 (steps S708 in FIG. 7, FIG. 8). Step S81). After that, the account management unit 221 generates account information including the generated account ID “IDA2”, the account name “A” and the password “PA” in the account creation request, and records them in the account information storage unit 231 ( Step S709 in FIG. 7 and Steps S82 and S83 in FIG. 8). Further, the account management unit 221 passes an account correspondence table registration request including the account name “A” and the account ID “IDA2” to the account correspondence table management unit 222 (step S84 in FIG. 8). As a result, the account correspondence table management unit 222 records the account name “A” and the account ID “IDA2” in association with each other in the account correspondence table storage unit 232 (step S710 in FIG. 7).
- the account management unit 221 transmits an account correspondence table registration request including the account name “A” and the account ID “IDA2” to the node 1 (step S711 in FIG. 7 and step S85 in FIG. 8).
- the account correspondence table registration unit 122 in the node 1 receives the account correspondence table registration request from the node 2
- the account correspondence table storage unit 232 associates the account name “A” with the account ID “IDA2”. (Step S712 in FIG. 7).
- the same processing as described above is performed.
- the contents of the account information storage units 131 and 231 are as shown in FIGS. 3A and 3B, respectively, and the contents of the account correspondence table storage units 132 and 232 are as shown in FIG. As shown in (A) and (B).
- the authentication unit 123 in the node 1 collates the account name “A” and the password “PA” in the authentication request sent from the node 4 with the account information recorded in the account information storage unit 131 (see FIG. 9 step S91). If the collation is successful (Yes in step S92), the node 4 is allowed to use the file system 124 (step S93). If the collation fails (step S92 is No), the use is rejected. (Step S94).
- the user U4 of the node 4 inputs a file registration instruction including the file name of the file to be registered from the input unit 43.
- the file registration request unit 423 transmits a file registration request including a file to be registered to the node 1.
- the file registration unit 127 in the node 1 When a file registration request is sent from the node 4, the file registration unit 127 in the node 1 first records the registration target file in the shared storage device 3 (step S101 in FIG. 10). Thereafter, the file registration unit 127 extracts the account name of the file creator from the file metadata of the file, and searches all account IDs recorded in association with the extracted account name from the account correspondence table storage unit 132 (step S102, S103). For example, if the account name of the file creator is “A” and the contents of the account correspondence table storage unit 132 are as shown in FIG. 4A, the account IDs “IDA1” and “IDA2” are searched. Become.
- the file registration unit 127 generates and generates an access control entry including the account ID and a predetermined access right for the file creator (for example, ALL) for each searched account ID.
- the account control entry is recorded in the access control list (step S104).
- User U 4 first transmits an authentication request to node 1 using authentication request unit 422 of node 4. Then, when the use of the file system 124 is permitted by the authentication unit 123 in the node 1, the file access unit 424 follows the instructions of the user U4 input from the input unit 43, as shown in FIGS. B) or a file access request shown in FIG.
- the access control unit 125 in the node 1 determines whether to permit file access by referring to the access control list of the file indicated by the file name 51 in the file access request. (Step S1201 in FIG. 12).
- step S1202 If the access control unit 125 determines that access is not permitted (No in step S1202), the access control unit 125 notifies the requesting node 4 that there is no access authority (step S1211), and then ends the process. On the other hand, if it is determined that access is permitted (Yes in step S1202), it is further determined whether the file access request is accompanied by a change in the access control list (step S1203). This determination is made based on whether or not “account name 54 of the account whose access control entry is to be changed” and “change content 55 for the access control list” are included in the file access request.
- the access control unit 125 calls the access control list changing unit 126 to execute an access control list change process (step S1204).
- the access control list changing unit 126 searches the account correspondence table storage unit 132 for the account ID recorded in association with the account name 54 of the account whose access control entry is to be changed (step S131 in FIG. 13).
- the access control entry in which the account ID is recorded is changed according to the change contents 55 (step S132).
- the access control list changing unit 126 returns a processing result to the access control unit 125 (step S133).
- the access control list changing unit 126 performs the following process.
- step S131 account IDs “IDB1” and “IDB2” recorded in association with the account name “B” are searched from the account correspondence table storage unit 132.
- step S132 the account ID is “IDB1” and the access authority is set.
- An access control entry with “READ” and an access control entry with an account ID “IDB2” and an access authority “READ” are added to the access control list.
- the contents of the access control list are changed to those shown in FIG.
- the access control list changing unit 126 performs the following process.
- step S131 account IDs “IDB1” and “IDB2” recorded in association with the account name “B” are retrieved from the account correspondence table storage unit 132.
- step S132 access including the account IDs “IDB1” and “IDB2” is retrieved. Both the access rights of the control list are changed to “WRITE”.
- the contents of the access control list are as shown in FIG.
- the access control list changing unit 126 performs the following process.
- step S131 account IDs “IDB1” and “IDB2” recorded in association with the account name “B” are retrieved from the account correspondence table storage unit 132.
- step S132 access including the account IDs “IDB1” and “IDB2” is retrieved. The control entry is deleted.
- the access control list is as shown in FIG.
- the access control unit 125 When the processing result returned from the access control list changing unit 126 indicates failure (step S1205), the access control unit 125 returns a response indicating processing failure to the requesting node 4 (step S1210). Then, the process ends.
- step S1205 whether the file access request sent from the node 4 involves processing on the file body. It is determined whether or not (step S1206). This determination is made based on whether or not “access content 53 for the file body” is included in the file access request.
- step S1206 If not included (No in step S1206), a response indicating that the process is successful is returned to the requesting node 4 (step S1209), and then the process ends. On the other hand, if it is included (step S1206 is Yes), processing according to “access content 53 for file main body” in the file access request is executed (step S1207). Note that the process of step S1207 is also performed when the determination result of step S1203 is No.
- step S1208 If the process is successful (Yes in step S1208), a response indicating the process success is returned to the requesting node 4 (step S1209), and then the process ends. On the other hand, if the process has failed (No in step S1208), a response indicating the process failure is returned to the requesting node 4 (step S1210), and then the process ends.
- the node 4 When the node 4 receives a response indicating the processing failure, the node 4 transmits a file access request to the node 1 again. When the node 4 receives a response indicating the processing failure continuously for a predetermined number of times, the node 4 It is determined that a failure has occurred, and processing similar to that performed on node 1 is performed on node 2. By doing so, the availability of the file server can be improved.
- the object whose access is controlled by the access control list is a file, but the object is not limited to this, and may be another object such as a folder.
- two nodes function as file servers. However, three or more nodes may be used.
- the reason is that when a file access request including the account name of the account whose access control entry is to be changed and the change content is input, the account ID recorded in association with the account name is searched from the account correspondence table storage unit. This is because the access control entry in which the searched account ID is recorded among the account control entries in the access control list to be changed is changed according to the change contents.
- the first node when an account creation request including the account name of the account to be created is input, the first node generates an account ID that uniquely identifies the account to be created in its own node, and the generated account ID and The account name in the account creation request is associated and recorded in the account correspondence table storage unit of the own node, and when an account correspondence table registration request is sent from the second node, the account ID included in this request
- the account creation request including the account name of the account created by the second node is input, the account to be created is uniquely identified in the own node.
- Generate an account ID to identify, and this account ID and account creation request Account correspondence table registration request including a count name is because so as to transmit to the first node.
- the reason is that the third node functioning as a client sends a file access request to the first node when the first node is operating normally, and a failure occurs in the first node. This is because the file access request is transmitted to the second node.
- the reason is that, when a file registration request is input, the account ID recorded in association with the account name of the file creator is searched from the account correspondence table storage unit, and the searched account ID and a predetermined access authority are searched. This is because the access control entry recorded in association with is created on the access control list of the registration target file.
- the network system includes an object 300-1 that is shared by first node 100, second node 200, first node 100, and second node 200.
- the first node 100 includes an account correspondence table 101 and an account control list changing unit 102.
- the account name and account ID of the account created in the own node 100 are recorded in association with each other, and the account name and account ID of the account created in the second node are recorded in association with each other. Is done.
- the access control list changing unit 102 responds to the access control list change request including the identification information of the object for changing the access control list, the account name of the account for changing the access control entry, and the change contents, and An account ID recorded in association with the account name for which the access control list change request is made is searched from 101. After that, the access control list changing unit 102 changes the access control entry in which the searched account ID is recorded and is included in the access control list of the object indicated by the identification information according to the change contents. To do.
- the reason is that when an access control list change request including the account name and change contents of the account whose access control entry is to be changed is input, the account ID recorded in association with the account name is searched from the account correspondence table. This is because the access control entry in which the searched account ID is recorded among the account control entries in the access control list to be changed is changed according to the change contents.
- the programs described in the above embodiments and the like are stored in a storage device or recorded on a computer-readable recording medium.
- the recording medium is a portable medium such as a flexible disk, an optical disk, a magneto-optical disk, and a semiconductor memory.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Automation & Control Theory (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
Abstract
Description
そこで、本発明の目的は、ドメインコントローラを備えていないネットワークシステムでは、同一のアカウント名を用いて複数のノードからアクセスできるオブジェクトのアクセス制御リストを変更する場合、変更作業が面倒になる、という課題を解決したネットワークシステムを提供することにある。
第1のノードと、第2のノードと、前記第1のノードと前記第2のノードとによって共有されるオブジェクト毎のアクセス制御リストであって、そのオブジェクトへのアクセスを許可するアカウントのアカウントIDとアクセス権限とが記録されたアクセス制御エントリを含むアクセス制御リストとを備え、
前記第1のノードは、
自ノードに作成されたアカウントのアカウント名とアカウントIDとが関連付けて記録されると共に、前記第2のノードに作成されたアカウントのアカウント名とアカウントIDとが関連付けて記録されたアカウント対応表と、
アクセス制御リストを変更するオブジェクトの識別情報と、アクセス制御エントリを変更するアカウントのアカウント名と、変更内容とを含むアクセス制御リスト変更要求に応答して、前記アカウント対応表から前記アクセス制御リスト変更要求中のアカウント名に関連付けて記録されているアカウントIDを検索し、該検索したアカウントIDが記録されているアクセス制御エントリであって、前記識別情報が示すオブジェクトのアクセス制御リストに含まれているアクセス制御エントリを前記変更内容に従って変更するアクセス制御リスト変更部とを備える。
自ノードに作成されたアカウントのアカウント名とアカウントIDとが関連付けて記録されると共に、他ノードに作成されたアカウントのアカウント名とアカウントIDとが関連付けて記録されたアカウント対応表と、
自ノードと前記他ノードとによって共有されるオブジェクトの内の、アクセス制御リストを変更するオブジェクトの識別情報と、アクセス制御エントリを変更するアカウントのアカウント名と、変更内容とを含むアクセス制御リスト変更要求に応答して、前記アカウント対応表から前記アクセス制御リスト変更要求中のアカウント名に関連付けて記録されているアカウントIDを検索し、該検索したアカウントIDとアクセス権限とが記録されているアクセス制御エントリであって、前記識別情報が示すオブジェクトのアクセス制御リストに含まれているアクセス制御エントリを前記変更内容に従って変更するアクセス制御リスト変更部と、を備える。
第1のノードと、第2のノードと、前記第1のノードと前記第2のノードとによって共有されるオブジェクト毎のアクセス制御リストであって、そのオブジェクトへのアクセスを許可するアカウントのアカウントIDとアクセス権限とが記録されたアクセス制御エントリを含むアクセス制御リストとを備えたネットワークシステムにおけるアクセス制御リスト変更方法であって、
前記第1のノードが、アクセス制御リストを変更するオブジェクトの識別情報と、アクセス制御エントリを変更するアカウントのアカウント名と、変更内容とを含むアクセス制御リスト変更要求に応答して、自ノードに作成されたアカウントのアカウント名とアカウントIDとが関連付けて記録されると共に、前記第2のノードに作成されたアカウントのアカウント名とアカウントIDとが関連付けて記録されたアカウント対応表から前記アクセス制御リスト変更要求中のアカウント名に関連付けて記録されているアカウントIDを検索し、該検索したアカウントIDが記録されているアクセス制御エントリであって、前記識別情報が示すオブジェクトのアクセス制御リストに含まれているアクセス制御エントリを前記変更内容に従って変更する。
自コンピュータに作成されたアカウントのアカウント名とアカウントIDとが関連付けて記録されると共に、他コンピュータに作成されたアカウントのアカウント名とアカウントIDとが関連付けて記録されたアカウント対応表を備えたコンピュータを、
自コンピュータと前記他コンピュータとによって共有されるオブジェクトの内の、アクセス制御リストを変更するオブジェクトの識別情報と、アクセス制御エントリを変更するアカウントのアカウント名と、変更内容とを含むアクセス制御リスト変更要求に応答して、前記アカウント対応表から前記アクセス制御リスト変更要求中のアカウント名に関連付けて記録されているアカウントIDを検索し、該検索したアカウントIDとアクセス権限とが記録されているアクセス制御エントリであって、前記識別情報が示すオブジェクトのアクセス制御リストに含まれているアクセス制御エントリを前記変更内容に従って変更するアクセス制御リスト変更部として機能させる。
図1を参照すると、本発明の第1の実施の形態に係るネットワークシステムは、ファイルサーバとして機能するノード1,2と、ノード1,2からアクセス可能な共有記憶装置3と、クライアントとして機能するノード4,5とを備え、各サーバ1,2,4,5は、ネットワークNWを介して相互に接続されている。本実施の形態では、可用性を高めるため、クライアントとして機能するノード4,5は、共有記憶装置3上のファイル31-1~31-Nをアクセスする場合、ノード1が正常動作していれば、ノード1を利用してアクセスし、ノード1に障害が発生していれば、ノード2を利用してアクセスする。
本実施の形態によれば、各ノードが個別にアカウントを管理するネットワークシステムにおいて、同一のアカウント名を用いて複数のノードからアクセスできるファイル(オブジェクト)のアクセス制御リストを変更する場合であっても、変更作業を簡単なものにすることができるという効果を得ることができる。
次に、本発明の第2の実施の形態に係るネットワークシステムについて説明する。
本実施の形態によれば、各ノードが個別にアカウントを管理するネットワークシステムにおいて、同一のアカウント名を用いて複数のノードからアクセスできるオブジェクトのアクセス制御リストを変更する場合であっても、変更作業を簡単なものにすることができるという効果を得ることができる。
11,21・・・送受信部
12,22・・・制御部
121,221・・・アカウント管理部
122,222・・・アカウント対応表管理部
123,223・・・認証部
124,224・・・ファイルシステム
125,225・・・アクセス制御部
126,226・・・アクセス制御リスト変更部
127,227・・・ファイル登録部
13,23・・・記憶装置
131,231・・・アカウント情報記憶部
132,232・・・アカウント対応表記憶部
14,24・・・入力部
15,25・・・表示部
3・・・共有記憶装置
31-1~31-N・・・ファイル
311・・・ファイルメタデータ
312・・・アクセス制御リスト
313・・・ファイル本体
100,200・・・ノード
101・・・アカウント対応表
102・・・アクセス制御リスト変更部
300-1~300-N・・・オブジェクト
301-1~301-N・・・アクセス制御リスト
Claims (8)
- 第1のノードと、第2のノードと、前記第1のノードと前記第2のノードとによって共有されるオブジェクト毎のアクセス制御リストであって、そのオブジェクトへのアクセスを許可するアカウントのアカウントIDとアクセス権限とが記録されたアクセス制御エントリを含むアクセス制御リストとを備え、
前記第1のノードは、
自ノードに作成されたアカウントのアカウント名とアカウントIDとが関連付けて記録されると共に、前記第2のノードに作成されたアカウントのアカウント名とアカウントIDとが関連付けて記録されたアカウント対応表と、
アクセス制御リストを変更するオブジェクトの識別情報と、アクセス制御エントリを変更するアカウントのアカウント名と、変更内容と、を含むアクセス制御リスト変更要求に応答して、前記アカウント対応表から前記アクセス制御リスト変更要求中のアカウント名に関連付けて記録されているアカウントIDを検索し、該検索したアカウントIDが記録されているアクセス制御エントリであって、前記識別情報が示すオブジェクトのアクセス制御リストに含まれているアクセス制御エントリを、前記変更内容に従って変更するアクセス制御リスト変更部と、を備える、
ことを特徴とするネットワークシステム。 - 請求項1記載のネットワークシステムにおいて、
前記第1のノードは、
第1のアカウント情報記憶部と、
作成するアカウントのアカウント名を含んだ第1のアカウント作成要求に応答して、自ノードにおいて前記アカウントを一意に識別するための第1のアカウントIDを生成し、該生成した第1のアカウントIDと前記第1のアカウント作成要求中のアカウント名とを含んだ第1のアカウント情報を前記第1のアカウント情報記憶部に記録する第1のアカウント管理部と、
該第1のアカウント管理部で生成した前記第1のアカウントIDと前記第1のアカウント作成要求中のアカウント名とを関連付けて前記アカウント対応表に記録すると共に、前記第2のノードから送られてくるアカウント対応表登録要求に含まれている第2のアカウントIDとアカウント名とを関連付けて前記アカウント対応表に記録するアカウント対応表管理部と、を備え、
前記第2のノードは、
第2のアカウント情報記憶部と、
作成するアカウントのアカウント名を含んだ第2のアカウント作成要求に応答して、自ノードにおいて前記アカウントを一意に識別するための第2のアカウントIDを生成し、該生成した第2のアカウントIDと前記第2のアカウント作成要求中のアカウント名とを含んだ第2のアカウント情報を前記第2のアカウント情報記憶部に記録すると共に、前記第1のノードに対して前記第2のアカウントIDと前記第2のアカウント作成要求中のアカウント名とを含んだアカウント対応表登録要求を送信する第2のアカウント管理部と、を備える、
ことを特徴とするネットワークシステム。 - 請求項1または2記載のネットワークシステムにおいて、
前記第1のノードが正常動作している場合は、前記第1のノードに対してアクセス対象にするオブジェクトの識別情報と、該識別情報が示すオブジェクトをアクセスする際に使用するアカウント名と、アクセス内容と、を含むアクセス要求を送信し、前記第1のノードに障害が発生している場合は、前記第2のノードに対してアクセス対象にするオブジェクトの識別情報と、該識別情報が示すオブジェクトをアクセスする際に使用するアカウント名と、アクセス内容と、を含むアクセス要求を送信するアクセス制御部を有する第3のノードを備える、
ことを特徴とするネットワークシステム。 - 請求項1乃至3の何れか1項に記載のネットワークシステムにおいて、
前記第1のノードと前記第2のノードとによって共有される前記オブジェクトは、前記第1のノードと前記第2のノードとからアクセス可能な共有記憶装置に記録されたファイルである、
ことを特徴とするネットワークシステム。 - 請求項4記載のネットワークシステムにおいて、
前記第1のノードは、
ファイル登録要求に応答して、前記アカウント対応表から登録対象ファイルの作成者のアカウント名に関連付けて記録されているアカウントIDを全て検索し、該検索したアカウントIDと予め定められているアクセス権限とを関連付けて記録したアクセス制御エントリを、前記登録対象ファイルのアクセス制御リスト上に作成するファイル登録部を備える、
ことを特徴とするネットワークシステム。 - 自ノードに作成されたアカウントのアカウント名とアカウントIDとが関連付けて記録されると共に、他ノードに作成されたアカウントのアカウント名とアカウントIDとが関連付けて記録されたアカウント対応表と、
自ノードと前記他ノードとによって共有されるオブジェクトの内の、アクセス制御リストを変更するオブジェクトの識別情報と、アクセス制御エントリを変更するアカウントのアカウント名と、変更内容とを含むアクセス制御リスト変更要求に応答して、前記アカウント対応表から前記アクセス制御リスト変更要求中のアカウント名に関連付けて記録されているアカウントIDを検索し、該検索したアカウントIDとアクセス権限とが記録されているアクセス制御エントリであって、前記識別情報が示すオブジェクトのアクセス制御リストに含まれているアクセス制御エントリを前記変更内容に従って変更するアクセス制御リスト変更部と、
を備えることを特徴とするノード。 - 第1のノードと、第2のノードと、前記第1のノードと前記第2のノードとによって共有されるオブジェクト毎のアクセス制御リストであって、そのオブジェクトへのアクセスを許可するアカウントのアカウントIDとアクセス権限とが記録されたアクセス制御エントリを含むアクセス制御リストと、を備えたネットワークシステムにおけるアクセス制御リスト変更方法であって、
前記第1のノードが、アクセス制御リストを変更するオブジェクトの識別情報と、アクセス制御エントリを変更するアカウントのアカウント名と、変更内容とを含むアクセス制御リスト変更要求に応答して、自ノードに作成されたアカウントのアカウント名とアカウントIDとが関連付けて記録されると共に、前記第2のノードに作成されたアカウントのアカウント名とアカウントIDとが関連付けて記録されたアカウント対応表から前記アクセス制御リスト変更要求中のアカウント名に関連付けて記録されているアカウントIDを検索し、該検索したアカウントIDが記録されているアクセス制御エントリであって、前記識別情報が示すオブジェクトのアクセス制御リストに含まれているアクセス制御エントリを、前記変更内容に従って変更する、
ことを特徴とするアクセス制御リスト変更方法。 - 自コンピュータに作成されたアカウントのアカウント名とアカウントIDとが関連付けて記録されると共に、他コンピュータに作成されたアカウントのアカウント名とアカウントIDとが関連付けて記録されたアカウント対応表を備えたコンピュータを、
自コンピュータと前記他コンピュータとによって共有されるオブジェクトの内の、アクセス制御リストを変更するオブジェクトの識別情報と、アクセス制御エントリを変更するアカウントのアカウント名と、変更内容とを含むアクセス制御リスト変更要求に応答して、前記アカウント対応表から前記アクセス制御リスト変更要求中のアカウント名に関連付けて記録されているアカウントIDを検索し、該検索したアカウントIDとアクセス権限とが記録されているアクセス制御エントリであって、前記識別情報が示すオブジェクトのアクセス制御リストに含まれているアクセス制御エントリを前記変更内容に従って変更するアクセス制御リスト変更部として機能させるためのプログラム。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201480006985.7A CN104969235B (zh) | 2013-01-31 | 2014-01-15 | 网络系统 |
EP14746195.8A EP2953051A4 (en) | 2013-01-31 | 2014-01-15 | NETWORK SYSTEM |
JP2014559545A JP5991386B2 (ja) | 2013-01-31 | 2014-01-15 | ネットワークシステム |
US14/759,760 US10129173B2 (en) | 2013-01-31 | 2014-01-15 | Network system and method for changing access rights associated with account IDs of an account name |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2013016834 | 2013-01-31 | ||
JP2013-016834 | 2013-01-31 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2014119233A1 true WO2014119233A1 (ja) | 2014-08-07 |
Family
ID=51261951
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2014/000142 WO2014119233A1 (ja) | 2013-01-31 | 2014-01-15 | ネットワークシステム |
Country Status (5)
Country | Link |
---|---|
US (1) | US10129173B2 (ja) |
EP (1) | EP2953051A4 (ja) |
JP (1) | JP5991386B2 (ja) |
CN (1) | CN104969235B (ja) |
WO (1) | WO2014119233A1 (ja) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9858288B2 (en) | 2012-08-03 | 2018-01-02 | Egnyte, Inc. | System and method for event-based synchronization of remote and local file systems |
CN103997508A (zh) * | 2013-02-20 | 2014-08-20 | 中兴通讯股份有限公司 | 一种集中存储照片的方法及装置 |
US10380076B2 (en) | 2014-07-21 | 2019-08-13 | Egnyte, Inc. | System and method for policy based synchronization of remote and local file systems |
US20170177613A1 (en) | 2015-12-22 | 2017-06-22 | Egnyte, Inc. | Event-Based User State Synchronization in a Cloud Storage System |
KR102523695B1 (ko) * | 2017-06-28 | 2023-04-20 | 골드만 삭스 뱅크 유에스에이 | 인터페이스 고유의 계정 식별자 |
WO2024072452A1 (en) * | 2022-09-29 | 2024-04-04 | Siemens Industry Software Inc. | User credential parameter space partitioning in a rule based access control system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005128781A (ja) * | 2003-10-23 | 2005-05-19 | Hitachi Ltd | 系切り替え方法及び情報処理システム |
JP2006085697A (ja) | 2004-09-15 | 2006-03-30 | Microsoft Corp | 信頼できるネットワークノードへのアクセス特権を制御するための方法とシステム |
US20070011136A1 (en) * | 2005-07-05 | 2007-01-11 | International Business Machines Corporation | Employing an identifier for an account of one domain in another domain to facilitate access of data on shared storage media |
JP2010044519A (ja) * | 2008-08-11 | 2010-02-25 | Fuji Xerox Co Ltd | 利用者情報管理プログラム、情報管理プログラム、情報管理装置、利用者情報管理装置及び情報管理システム |
JP2011526387A (ja) | 2008-06-27 | 2011-10-06 | マイクロソフト コーポレーション | コンピューティングプロセスのための最小特権アクセスの付与 |
Family Cites Families (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5768519A (en) * | 1996-01-18 | 1998-06-16 | Microsoft Corporation | Method and apparatus for merging user accounts from a source security domain into a target security domain |
US5708812A (en) * | 1996-01-18 | 1998-01-13 | Microsoft Corporation | Method and apparatus for Migrating from a source domain network controller to a target domain network controller |
US6032216A (en) * | 1997-07-11 | 2000-02-29 | International Business Machines Corporation | Parallel file system with method using tokens for locking modes |
US7392383B2 (en) * | 2003-09-25 | 2008-06-24 | International Business Machines Corporation | Method and apparatus for providing process-based access controls on computer resources |
US9697373B2 (en) * | 2004-11-05 | 2017-07-04 | International Business Machines Corporation | Facilitating ownership of access control lists by users or groups |
US20060123472A1 (en) * | 2004-12-07 | 2006-06-08 | Microsoft Corporation | Providing tokens to access federated resources |
US7627569B2 (en) * | 2005-06-30 | 2009-12-01 | Google Inc. | Document access control |
US20080077635A1 (en) * | 2006-09-22 | 2008-03-27 | Digital Bazaar, Inc. | Highly Available Clustered Storage Network |
US8214641B2 (en) * | 2007-08-23 | 2012-07-03 | Microsoft Corporation | File access in multi-protocol environment |
US20100199346A1 (en) * | 2009-02-02 | 2010-08-05 | Telcordia Technologies, Inc. | System and method for determining symantic equivalence between access control lists |
US8370510B2 (en) * | 2009-12-18 | 2013-02-05 | Microsoft Corporation | Remote application presentation over a public network connection |
JP2012037951A (ja) * | 2010-08-04 | 2012-02-23 | Fuji Xerox Co Ltd | 情報処理プログラム及び情報処理装置 |
US8869244B1 (en) * | 2011-05-03 | 2014-10-21 | Symantec Corporation | Techniques for providing role-based access control using dynamic shared accounts |
US8516607B2 (en) * | 2011-05-23 | 2013-08-20 | Qualcomm Incorporated | Facilitating data access control in peer-to-peer overlay networks |
US8856530B2 (en) * | 2011-09-21 | 2014-10-07 | Onyx Privacy, Inc. | Data storage incorporating cryptographically enhanced data protection |
US20130091562A1 (en) * | 2011-10-05 | 2013-04-11 | Hitachi, Ltd. | Computer |
US8826390B1 (en) * | 2012-05-09 | 2014-09-02 | Google Inc. | Sharing and access control |
US9460300B1 (en) * | 2012-09-10 | 2016-10-04 | Google Inc. | Utilizing multiple access control objects to manage access control |
-
2014
- 2014-01-15 EP EP14746195.8A patent/EP2953051A4/en not_active Withdrawn
- 2014-01-15 JP JP2014559545A patent/JP5991386B2/ja not_active Expired - Fee Related
- 2014-01-15 US US14/759,760 patent/US10129173B2/en active Active
- 2014-01-15 WO PCT/JP2014/000142 patent/WO2014119233A1/ja active Application Filing
- 2014-01-15 CN CN201480006985.7A patent/CN104969235B/zh active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005128781A (ja) * | 2003-10-23 | 2005-05-19 | Hitachi Ltd | 系切り替え方法及び情報処理システム |
JP2006085697A (ja) | 2004-09-15 | 2006-03-30 | Microsoft Corp | 信頼できるネットワークノードへのアクセス特権を制御するための方法とシステム |
US20070011136A1 (en) * | 2005-07-05 | 2007-01-11 | International Business Machines Corporation | Employing an identifier for an account of one domain in another domain to facilitate access of data on shared storage media |
JP2011526387A (ja) | 2008-06-27 | 2011-10-06 | マイクロソフト コーポレーション | コンピューティングプロセスのための最小特権アクセスの付与 |
JP2010044519A (ja) * | 2008-08-11 | 2010-02-25 | Fuji Xerox Co Ltd | 利用者情報管理プログラム、情報管理プログラム、情報管理装置、利用者情報管理装置及び情報管理システム |
Non-Patent Citations (1)
Title |
---|
See also references of EP2953051A4 |
Also Published As
Publication number | Publication date |
---|---|
EP2953051A4 (en) | 2016-09-21 |
CN104969235A (zh) | 2015-10-07 |
US10129173B2 (en) | 2018-11-13 |
EP2953051A1 (en) | 2015-12-09 |
CN104969235B (zh) | 2018-02-02 |
JP5991386B2 (ja) | 2016-09-14 |
JPWO2014119233A1 (ja) | 2017-01-26 |
US20150350107A1 (en) | 2015-12-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11128465B2 (en) | Zero-knowledge identity verification in a distributed computing system | |
JP5991386B2 (ja) | ネットワークシステム | |
CN108280367B (zh) | 数据操作权限的管理方法、装置、计算设备及存储介质 | |
US11372990B2 (en) | Restricting access to content | |
US11082226B2 (en) | Zero-knowledge identity verification in a distributed computing system | |
US9294485B2 (en) | Controlling access to shared content in an online content management system | |
CN110192198B (zh) | 访问存储的资源的安全性 | |
US7716490B2 (en) | Access control apparatus, access control method, access control program, recording medium, access control data, and relation description data | |
US10484383B2 (en) | Pre-authorizing a client application to access a user account on a content management system | |
JP5320433B2 (ja) | 統合検索装置、統合検索システム、統合検索方法 | |
JP6140735B2 (ja) | アクセス制御装置、アクセス制御方法、およびプログラム | |
CN105516059B (zh) | 一种资源访问控制方法和装置 | |
US11803663B2 (en) | Systems and methods for multi-region data center connectivity | |
KR101668550B1 (ko) | 비밀번호 기반 역할 및 권한 부여 장치 및 방법 | |
JP2007535753A (ja) | 連絡先ベースのリソース共有を提供するユーザーインタフェースのためのシステムおよび方法 | |
JP4952600B2 (ja) | 管理装置および管理プログラム | |
JP2022108304A (ja) | チャットボット制御装置およびチャットボット制御方法 | |
JP4068125B2 (ja) | データアクセス方法および計算機システム | |
JP5980421B2 (ja) | アクセス制御装置及びアクセス制御方法及びプログラム | |
JP7497230B2 (ja) | 計算機システム及び連携制御方法 | |
JP2018005592A (ja) | 文書閲覧制御装置、文書閲覧制御システム及びプログラム | |
JP2023001780A (ja) | データアクセス制御方法、データアクセス制御装置、データアクセス制御プログラム | |
JP2008234510A (ja) | データ管理システム及び方法並びにプログラム | |
JP2010033102A (ja) | 情報処理端末、アクセス制御システム、アクセス制御規則割当方法およびプログラム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14746195 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 14759760 Country of ref document: US Ref document number: 2014746195 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2014559545 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |