Policy scope management

The appropriate scoping of an access policy can be determined using the observed access and usage of various resources covered under that policy. Information about access requests received over a period of time can be logged, and actions represented in the log data can be mapped to the permissions o...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Watson, Alexander, Bray, Tyler Stuart, Cook, John, Puchalski, Jeff, Rungta, Neha, Gough, Michael, Luckow, Kasper Søe
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Watson, Alexander
Bray, Tyler Stuart
Cook, John
Puchalski, Jeff
Rungta, Neha
Gough, Michael
Luckow, Kasper Søe
description The appropriate scoping of an access policy can be determined using the observed access and usage of various resources covered under that policy. Information about access requests received over a period of time can be logged, and actions represented in the log data can be mapped to the permissions of the access policy. A new access policy can be generated that includes grant permissions only for those actions that were received and/or granted during the monitored period of time. The new policy can be processed using policy logic to ensure that changes in permission comply with rules or policies for the target resources. The new policy can be at least partially implemented, or can be provided to an authorized user, who can choose to adopt or deny the new policy, or to accept some of the recommendations for modifying the current policy.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US11863563B1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US11863563B1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US11863563B13</originalsourceid><addsrcrecordid>eNrjZBAPyM_JTK5UKE7OL0hVyE3MS0xPzU3NK-FhYE1LzClO5YXS3AyKbq4hzh66qQX58anFBYnJqXmpJfGhwYaGFmbGpmbGTobGxKgBANB3Ihk</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Policy scope management</title><source>esp@cenet</source><creator>Watson, Alexander ; Bray, Tyler Stuart ; Cook, John ; Puchalski, Jeff ; Rungta, Neha ; Gough, Michael ; Luckow, Kasper Søe</creator><creatorcontrib>Watson, Alexander ; Bray, Tyler Stuart ; Cook, John ; Puchalski, Jeff ; Rungta, Neha ; Gough, Michael ; Luckow, Kasper Søe</creatorcontrib><description>The appropriate scoping of an access policy can be determined using the observed access and usage of various resources covered under that policy. Information about access requests received over a period of time can be logged, and actions represented in the log data can be mapped to the permissions of the access policy. A new access policy can be generated that includes grant permissions only for those actions that were received and/or granted during the monitored period of time. The new policy can be processed using policy logic to ensure that changes in permission comply with rules or policies for the target resources. The new policy can be at least partially implemented, or can be provided to an authorized user, who can choose to adopt or deny the new policy, or to accept some of the recommendations for modifying the current policy.</description><language>eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2024</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20240102&amp;DB=EPODOC&amp;CC=US&amp;NR=11863563B1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20240102&amp;DB=EPODOC&amp;CC=US&amp;NR=11863563B1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Watson, Alexander</creatorcontrib><creatorcontrib>Bray, Tyler Stuart</creatorcontrib><creatorcontrib>Cook, John</creatorcontrib><creatorcontrib>Puchalski, Jeff</creatorcontrib><creatorcontrib>Rungta, Neha</creatorcontrib><creatorcontrib>Gough, Michael</creatorcontrib><creatorcontrib>Luckow, Kasper Søe</creatorcontrib><title>Policy scope management</title><description>The appropriate scoping of an access policy can be determined using the observed access and usage of various resources covered under that policy. Information about access requests received over a period of time can be logged, and actions represented in the log data can be mapped to the permissions of the access policy. A new access policy can be generated that includes grant permissions only for those actions that were received and/or granted during the monitored period of time. The new policy can be processed using policy logic to ensure that changes in permission comply with rules or policies for the target resources. The new policy can be at least partially implemented, or can be provided to an authorized user, who can choose to adopt or deny the new policy, or to accept some of the recommendations for modifying the current policy.</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2024</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZBAPyM_JTK5UKE7OL0hVyE3MS0xPzU3NK-FhYE1LzClO5YXS3AyKbq4hzh66qQX58anFBYnJqXmpJfGhwYaGFmbGpmbGTobGxKgBANB3Ihk</recordid><startdate>20240102</startdate><enddate>20240102</enddate><creator>Watson, Alexander</creator><creator>Bray, Tyler Stuart</creator><creator>Cook, John</creator><creator>Puchalski, Jeff</creator><creator>Rungta, Neha</creator><creator>Gough, Michael</creator><creator>Luckow, Kasper Søe</creator><scope>EVB</scope></search><sort><creationdate>20240102</creationdate><title>Policy scope management</title><author>Watson, Alexander ; Bray, Tyler Stuart ; Cook, John ; Puchalski, Jeff ; Rungta, Neha ; Gough, Michael ; Luckow, Kasper Søe</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US11863563B13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2024</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Watson, Alexander</creatorcontrib><creatorcontrib>Bray, Tyler Stuart</creatorcontrib><creatorcontrib>Cook, John</creatorcontrib><creatorcontrib>Puchalski, Jeff</creatorcontrib><creatorcontrib>Rungta, Neha</creatorcontrib><creatorcontrib>Gough, Michael</creatorcontrib><creatorcontrib>Luckow, Kasper Søe</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Watson, Alexander</au><au>Bray, Tyler Stuart</au><au>Cook, John</au><au>Puchalski, Jeff</au><au>Rungta, Neha</au><au>Gough, Michael</au><au>Luckow, Kasper Søe</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Policy scope management</title><date>2024-01-02</date><risdate>2024</risdate><abstract>The appropriate scoping of an access policy can be determined using the observed access and usage of various resources covered under that policy. Information about access requests received over a period of time can be logged, and actions represented in the log data can be mapped to the permissions of the access policy. A new access policy can be generated that includes grant permissions only for those actions that were received and/or granted during the monitored period of time. The new policy can be processed using policy logic to ensure that changes in permission comply with rules or policies for the target resources. The new policy can be at least partially implemented, or can be provided to an authorized user, who can choose to adopt or deny the new policy, or to accept some of the recommendations for modifying the current policy.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US11863563B1
source esp@cenet
subjects ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title Policy scope management
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T05%3A24%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Watson,%20Alexander&rft.date=2024-01-02&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS11863563B1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true