Identifying dependencies of an application upon a given security context
A technique for identifying dependencies of an application upon a given security context includes monitoring security checks generated by the application. The security checks requiring elevated rights are identified and the state of execution of the application corresponding to the identified securi...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | VERBOWSKI CHAD E CHEN SHUO DUNAGAN JOHN D WANG YI-MIN |
description | A technique for identifying dependencies of an application upon a given security context includes monitoring security checks generated by the application. The security checks requiring elevated rights are identified and the state of execution of the application corresponding to the identified security checks may be logged. The security checks requiring elevated rights may be identified by monitoring access checks, monitoring privilege checks, checking user/group identifiers against a list of known identifiers associated with elevated rights, or the like. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2007006283A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2007006283A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2007006283A13</originalsourceid><addsrcrecordid>eNqNirEKwkAQBa-xEPUfFqyFMwFNK6LEWq3DcnkJC2Fv8S5i_t4UfoDNDAOzdPWthWbpJtGeWhh07iBIFDtiJTYbJHCWqDTaDKZe3lBKCONL8kQhasYnr92i4yFh8_PKba-Xx7newWKDZBygyM3zXnh_9P5QVOVpX_53fQGeBTWN</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Identifying dependencies of an application upon a given security context</title><source>esp@cenet</source><creator>VERBOWSKI CHAD E ; CHEN SHUO ; DUNAGAN JOHN D ; WANG YI-MIN</creator><creatorcontrib>VERBOWSKI CHAD E ; CHEN SHUO ; DUNAGAN JOHN D ; WANG YI-MIN</creatorcontrib><description>A technique for identifying dependencies of an application upon a given security context includes monitoring security checks generated by the application. The security checks requiring elevated rights are identified and the state of execution of the application corresponding to the identified security checks may be logged. The security checks requiring elevated rights may be identified by monitoring access checks, monitoring privilege checks, checking user/group identifiers against a list of known identifiers associated with elevated rights, or the like.</description><language>eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2007</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20070104&DB=EPODOC&CC=US&NR=2007006283A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20070104&DB=EPODOC&CC=US&NR=2007006283A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>VERBOWSKI CHAD E</creatorcontrib><creatorcontrib>CHEN SHUO</creatorcontrib><creatorcontrib>DUNAGAN JOHN D</creatorcontrib><creatorcontrib>WANG YI-MIN</creatorcontrib><title>Identifying dependencies of an application upon a given security context</title><description>A technique for identifying dependencies of an application upon a given security context includes monitoring security checks generated by the application. The security checks requiring elevated rights are identified and the state of execution of the application corresponding to the identified security checks may be logged. The security checks requiring elevated rights may be identified by monitoring access checks, monitoring privilege checks, checking user/group identifiers against a list of known identifiers associated with elevated rights, or the like.</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2007</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNirEKwkAQBa-xEPUfFqyFMwFNK6LEWq3DcnkJC2Fv8S5i_t4UfoDNDAOzdPWthWbpJtGeWhh07iBIFDtiJTYbJHCWqDTaDKZe3lBKCONL8kQhasYnr92i4yFh8_PKba-Xx7newWKDZBygyM3zXnh_9P5QVOVpX_53fQGeBTWN</recordid><startdate>20070104</startdate><enddate>20070104</enddate><creator>VERBOWSKI CHAD E</creator><creator>CHEN SHUO</creator><creator>DUNAGAN JOHN D</creator><creator>WANG YI-MIN</creator><scope>EVB</scope></search><sort><creationdate>20070104</creationdate><title>Identifying dependencies of an application upon a given security context</title><author>VERBOWSKI CHAD E ; CHEN SHUO ; DUNAGAN JOHN D ; WANG YI-MIN</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2007006283A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2007</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>VERBOWSKI CHAD E</creatorcontrib><creatorcontrib>CHEN SHUO</creatorcontrib><creatorcontrib>DUNAGAN JOHN D</creatorcontrib><creatorcontrib>WANG YI-MIN</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>VERBOWSKI CHAD E</au><au>CHEN SHUO</au><au>DUNAGAN JOHN D</au><au>WANG YI-MIN</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Identifying dependencies of an application upon a given security context</title><date>2007-01-04</date><risdate>2007</risdate><abstract>A technique for identifying dependencies of an application upon a given security context includes monitoring security checks generated by the application. The security checks requiring elevated rights are identified and the state of execution of the application corresponding to the identified security checks may be logged. The security checks requiring elevated rights may be identified by monitoring access checks, monitoring privilege checks, checking user/group identifiers against a list of known identifiers associated with elevated rights, or the like.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US2007006283A1 |
source | esp@cenet |
subjects | ELECTRIC COMMUNICATION TECHNIQUE ELECTRICITY TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | Identifying dependencies of an application upon a given security context |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T16%3A14%3A41IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=VERBOWSKI%20CHAD%20E&rft.date=2007-01-04&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2007006283A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |