ATE465464T1 - System und verfahren zum repräsentieren mehrerer security-gruppen als ein einziges datenobjekt - Google Patents
System und verfahren zum repräsentieren mehrerer security-gruppen als ein einziges datenobjektInfo
- Publication number
- ATE465464T1 ATE465464T1 AT04729114T AT04729114T ATE465464T1 AT E465464 T1 ATE465464 T1 AT E465464T1 AT 04729114 T AT04729114 T AT 04729114T AT 04729114 T AT04729114 T AT 04729114T AT E465464 T1 ATE465464 T1 AT E465464T1
- Authority
- AT
- Austria
- Prior art keywords
- group
- set value
- complex
- value
- data object
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Bioethics (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
- Alarm Systems (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US10/455,165 US7480798B2 (en) | 2003-06-05 | 2003-06-05 | System and method for representing multiple security groups as a single data object |
| PCT/EP2004/005185 WO2004109480A2 (en) | 2003-06-05 | 2004-04-23 | System and method for representing multiple security groups as a single data object |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| ATE465464T1 true ATE465464T1 (de) | 2010-05-15 |
Family
ID=33510410
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| AT04729114T ATE465464T1 (de) | 2003-06-05 | 2004-04-23 | System und verfahren zum repräsentieren mehrerer security-gruppen als ein einziges datenobjekt |
Country Status (7)
| Country | Link |
|---|---|
| US (2) | US7480798B2 (de) |
| EP (1) | EP1634137B1 (de) |
| KR (1) | KR100773002B1 (de) |
| CN (1) | CN100361037C (de) |
| AT (1) | ATE465464T1 (de) |
| DE (1) | DE602004026722D1 (de) |
| WO (1) | WO2004109480A2 (de) |
Families Citing this family (17)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7526347B2 (en) * | 2003-02-18 | 2009-04-28 | Fisher-Rosemount Systems, Inc. | Security for objects in a process plant configuration system |
| US7698683B1 (en) * | 2003-03-18 | 2010-04-13 | Troux Technologies | Adaptive system for dynamic object-oriented schemas |
| US8234223B1 (en) | 2005-04-28 | 2012-07-31 | Troux Technologies, Inc. | Method and system for calculating cost of an asset using a data model |
| US20070061593A1 (en) * | 2005-09-15 | 2007-03-15 | Ufuk Celikkan | Sending secured data |
| US20070079382A1 (en) * | 2005-09-15 | 2007-04-05 | Ufuk Celikkan | Authorizing computer services |
| US8214877B1 (en) * | 2006-05-22 | 2012-07-03 | Troux Technologies | System and method for the implementation of policies |
| US8230484B1 (en) * | 2007-05-01 | 2012-07-24 | Emc Corporation | Control of resource access privileges via agent authentication |
| US8001604B2 (en) * | 2007-11-06 | 2011-08-16 | International Business Machines Corporation | Method and apparatus for masking child user authorizations from adverse use against a parent user |
| US8635592B1 (en) | 2011-02-08 | 2014-01-21 | Troux Technologies, Inc. | Method and system for tailoring software functionality |
| US8479302B1 (en) * | 2011-02-28 | 2013-07-02 | Emc Corporation | Access control via organization charts |
| US9495393B2 (en) | 2011-07-27 | 2016-11-15 | EMC IP Holding Company, LLC | System and method for reviewing role definitions |
| US9280581B1 (en) | 2013-03-12 | 2016-03-08 | Troux Technologies, Inc. | Method and system for determination of data completeness for analytic data calculations |
| KR20150077643A (ko) * | 2013-12-30 | 2015-07-08 | 한국전자통신연구원 | 다중사용자 무선통신시스템에서 사용자를 식별하는 장치 및 방법 |
| US9548897B2 (en) | 2014-01-17 | 2017-01-17 | Amazon Technologies, Inc. | Network entity registry for network entity handles included in network traffic policies enforced for a provider network |
| CN110858833B (zh) | 2018-08-22 | 2022-09-30 | 京东方科技集团股份有限公司 | 访问控制策略配置方法、装置和系统以及存储介质 |
| CN113612730B (zh) * | 2021-07-05 | 2023-04-07 | 裕太微电子股份有限公司 | 一种acl访问规则控制方法、处理装置及系统 |
| US11928517B2 (en) * | 2021-07-08 | 2024-03-12 | EMC IP Holding Company LLC | Feature resource self-tuning and rebalancing |
Family Cites Families (41)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4525780A (en) * | 1981-05-22 | 1985-06-25 | Data General Corporation | Data processing system having a memory using object-based information and a protection scheme for determining access rights to such information |
| JPH087709B2 (ja) * | 1989-05-15 | 1996-01-29 | インターナシヨナル・ビジネス・マシーンズ・コーポレーシヨン | アクセス特権制御方法及びシステム |
| US5129083A (en) * | 1989-06-29 | 1992-07-07 | Digital Equipment Corporation | Conditional object creating system having different object pointers for accessing a set of data structure objects |
| US5263157A (en) * | 1990-02-15 | 1993-11-16 | International Business Machines Corporation | Method and system for providing user access control within a distributed data processing system by the exchange of access control profiles |
| US5173939A (en) * | 1990-09-28 | 1992-12-22 | Digital Equipment Corporation | Access control subsystem and method for distributed computer system using compound principals |
| US5315657A (en) * | 1990-09-28 | 1994-05-24 | Digital Equipment Corporation | Compound principals in access control lists |
| US5454101A (en) * | 1992-09-15 | 1995-09-26 | Universal Firmware Industries, Ltd. | Data storage system with set lists which contain elements associated with parents for defining a logical hierarchy and general record pointers identifying specific data sets |
| US5454039A (en) * | 1993-12-06 | 1995-09-26 | International Business Machines Corporation | Software-efficient pseudorandom function and the use thereof for encryption |
| EP0752652B1 (de) * | 1995-07-03 | 1998-12-16 | Sun Microsystems, Inc. | Systen und Verfahren zum Implementieren einer hierarchischen Politik für die Administration eines Computersystems |
| US5787427A (en) * | 1996-01-03 | 1998-07-28 | International Business Machines Corporation | Information handling system, method, and article of manufacture for efficient object security processing by grouping objects sharing common control access policies |
| US5768519A (en) * | 1996-01-18 | 1998-06-16 | Microsoft Corporation | Method and apparatus for merging user accounts from a source security domain into a target security domain |
| US6023765A (en) * | 1996-12-06 | 2000-02-08 | The United States Of America As Represented By The Secretary Of Commerce | Implementation of role-based access control in multi-level secure systems |
| US6125408A (en) * | 1997-03-10 | 2000-09-26 | Compaq Computer Corporation | Resource type prioritization in generating a device configuration |
| US6408336B1 (en) * | 1997-03-10 | 2002-06-18 | David S. Schneider | Distributed administration of access to information |
| US5878415A (en) * | 1997-03-20 | 1999-03-02 | Novell, Inc. | Controlling access to objects in a hierarchical database |
| US6064656A (en) | 1997-10-31 | 2000-05-16 | Sun Microsystems, Inc. | Distributed system and method for controlling access control to network resources |
| US6202066B1 (en) * | 1997-11-19 | 2001-03-13 | The United States Of America As Represented By The Secretary Of Commerce | Implementation of role/group permission association using object access type |
| US6044466A (en) * | 1997-11-25 | 2000-03-28 | International Business Machines Corp. | Flexible and dynamic derivation of permissions |
| JP3867388B2 (ja) * | 1998-02-12 | 2007-01-10 | 富士ゼロックス株式会社 | 条件付き認証装置および方法 |
| JPH11313102A (ja) * | 1998-02-27 | 1999-11-09 | Fujitsu Ltd | アクセス制御リスト生成方法及びその装置 |
| US6457130B2 (en) * | 1998-03-03 | 2002-09-24 | Network Appliance, Inc. | File access control in a multi-protocol file server |
| US6772350B1 (en) * | 1998-05-15 | 2004-08-03 | E.Piphany, Inc. | System and method for controlling access to resources in a distributed environment |
| US6466932B1 (en) * | 1998-08-14 | 2002-10-15 | Microsoft Corporation | System and method for implementing group policy |
| US6625603B1 (en) * | 1998-09-21 | 2003-09-23 | Microsoft Corporation | Object type specific access control |
| US6412070B1 (en) * | 1998-09-21 | 2002-06-25 | Microsoft Corporation | Extensible security system and method for controlling access to objects in a computing environment |
| US6532505B1 (en) * | 1999-11-12 | 2003-03-11 | Infineon Technologies Ag | Universal resource access controller |
| US6651096B1 (en) * | 1999-04-20 | 2003-11-18 | Cisco Technology, Inc. | Method and apparatus for organizing, storing and evaluating access control lists |
| US6581060B1 (en) * | 2000-06-21 | 2003-06-17 | International Business Machines Corporation | System and method for RDBMS to protect records in accordance with non-RDBMS access control rules |
| US7350204B2 (en) * | 2000-07-24 | 2008-03-25 | Microsoft Corporation | Policies for secure software execution |
| US7305701B2 (en) * | 2001-04-30 | 2007-12-04 | Microsoft Corporation | Methods and arrangements for controlling access to resources based on authentication method |
| US7152046B2 (en) * | 2001-05-31 | 2006-12-19 | Contentguard Holdings, Inc. | Method and apparatus for tracking status of resource in a system for managing use of the resources |
| US7380271B2 (en) * | 2001-07-12 | 2008-05-27 | International Business Machines Corporation | Grouped access control list actions |
| US6910041B2 (en) * | 2001-08-23 | 2005-06-21 | International Business Machines Corporation | Authorization model for administration |
| US7249379B2 (en) * | 2002-02-01 | 2007-07-24 | Systems Advisory Group Enterprises, Inc. | Method and apparatus for implementing process-based security in a computer system |
| US6678828B1 (en) * | 2002-07-22 | 2004-01-13 | Vormetric, Inc. | Secure network file access control system |
| US7107538B1 (en) * | 2002-09-12 | 2006-09-12 | Novell, Inc. | Enforcing security on an attribute of an object |
| US20040088563A1 (en) * | 2002-11-01 | 2004-05-06 | Hogan Dirk J. | Computer access authorization |
| EP1634175B1 (de) * | 2003-05-28 | 2015-06-24 | Citrix Systems, Inc. | Mehrschichtiges zugriffssteuer-sicherheitssystem |
| CA2459004A1 (en) * | 2004-02-20 | 2005-08-20 | Ibm Canada Limited - Ibm Canada Limitee | Method and system to control data acces using security label components |
| US7484237B2 (en) * | 2004-05-13 | 2009-01-27 | Hewlett-Packard Development Company, L.P. | Method and apparatus for role-based security policy management |
| US7827402B2 (en) * | 2004-12-01 | 2010-11-02 | Cisco Technology, Inc. | Method and apparatus for ingress filtering using security group information |
-
2003
- 2003-06-05 US US10/455,165 patent/US7480798B2/en not_active Expired - Lifetime
-
2004
- 2004-04-23 AT AT04729114T patent/ATE465464T1/de not_active IP Right Cessation
- 2004-04-23 WO PCT/EP2004/005185 patent/WO2004109480A2/en not_active Ceased
- 2004-04-23 KR KR1020057021116A patent/KR100773002B1/ko not_active Expired - Fee Related
- 2004-04-23 EP EP04729114A patent/EP1634137B1/de not_active Expired - Lifetime
- 2004-04-23 CN CNB2004800219009A patent/CN100361037C/zh not_active Expired - Lifetime
- 2004-04-23 DE DE602004026722T patent/DE602004026722D1/de not_active Expired - Lifetime
-
2008
- 2008-12-17 US US12/337,593 patent/US7757277B2/en not_active Expired - Fee Related
Also Published As
| Publication number | Publication date |
|---|---|
| US7757277B2 (en) | 2010-07-13 |
| EP1634137B1 (de) | 2010-04-21 |
| US20090100510A1 (en) | 2009-04-16 |
| US7480798B2 (en) | 2009-01-20 |
| CN100361037C (zh) | 2008-01-09 |
| WO2004109480A2 (en) | 2004-12-16 |
| DE602004026722D1 (de) | 2010-06-02 |
| EP1634137A2 (de) | 2006-03-15 |
| KR100773002B1 (ko) | 2007-11-05 |
| WO2004109480A3 (en) | 2005-06-16 |
| US20050021952A1 (en) | 2005-01-27 |
| CN1829949A (zh) | 2006-09-06 |
| KR20060023962A (ko) | 2006-03-15 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| ATE465464T1 (de) | System und verfahren zum repräsentieren mehrerer security-gruppen als ein einziges datenobjekt | |
| EP1394657A3 (de) | Verfahren und Vorrichtung zur sequenziellen Verarbeitung eines biometrischen Musters | |
| ATE48327T1 (de) | Verfahren und vorrichtung um dem inhaber eines tragbaren objektes, insbesondere einer karte, mit dieser karte den zugriff zu einer dienstleistung von wenigstens einer berechtigenden stelle zu ermoeglichen. | |
| WO1999016031A3 (en) | Method and apparatus for asymmetric key management in a cryptographic system | |
| DE60044168D1 (de) | Verfahren zur sicherung einer elektronischen verschlüsselungsvorrichtung mit geheimschlüssel gegen angriffe mittels physischer analyse | |
| JP2006512864A5 (de) | ||
| ATE343273T1 (de) | Biometrisches authentifizierungssystem | |
| DE1155366T1 (de) | Techniken zum gewähren des zugriffs durch eine kontextsperre in einem gerät mit kleinem platzbedarf unter verwendung von einem eingangspunktobjekt | |
| ATE410020T1 (de) | Verfahren und system zur sicheren konfiguration eines client-gerätes | |
| CN106372481A (zh) | 一种指纹排列组合密码 | |
| CN112000933A (zh) | 应用软件的激活方法、装置、电子设备及存储介质 | |
| WO2019088313A1 (ko) | 딥러닝을 이용한 암호화 방법 | |
| CN104573493B (zh) | 一种软件保护方法和系统 | |
| CN105488406A (zh) | 一种基于特征向量的相似恶意样本匹配方法及系统 | |
| CN114218176A (zh) | 一种跨平台数据安全共享交换方法 | |
| CN111327413A (zh) | 一种侧信道数据处理方法及设备 | |
| ATE463810T1 (de) | Verfahren zur regelung des zutrittsregimes zu einem objekt | |
| CN102983969A (zh) | 一种操作系统的安全登录系统及安全登录方法 | |
| US20130152179A1 (en) | System and method for user authentication using one-time identification | |
| US20230022849A1 (en) | Methods and systems for providing data from an internal data processing system of an industrial plant to an external data processing system | |
| WO2004012029A3 (en) | Restricting access to a method in a component | |
| CN115983867B (zh) | 一种防窃电识别方法、系统及存储介质 | |
| DE60108645D1 (de) | Verfahren und vorrichtung zur zentralisierten authentifizierung | |
| EP1331753A3 (de) | Verfahren und Vorrichtung zur gleichzeitigen Erstellung einer Benutzeridentität und einer Gruppenzugehörigkeit | |
| Hieb et al. | Using bloom filters to ensure access control and authentication requirements for SCADA field devices |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| RER | Ceased as to paragraph 5 lit. 3 law introducing patent treaties |