Identifying dependencies of an application upon a given security context

A technique for identifying dependencies of an application upon a given security context includes monitoring security checks generated by the application. The security checks requiring elevated rights are identified and the state of execution of the application corresponding to the identified securi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: VERBOWSKI CHAD E, CHEN SHUO, DUNAGAN JOHN D, WANG YI-MIN
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator VERBOWSKI CHAD E
CHEN SHUO
DUNAGAN JOHN D
WANG YI-MIN
description A technique for identifying dependencies of an application upon a given security context includes monitoring security checks generated by the application. The security checks requiring elevated rights are identified and the state of execution of the application corresponding to the identified security checks may be logged. The security checks requiring elevated rights may be identified by monitoring access checks, monitoring privilege checks, checking user/group identifiers against a list of known identifiers associated with elevated rights, or the like.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2007006283A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2007006283A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2007006283A13</originalsourceid><addsrcrecordid>eNqNirEKwkAQBa-xEPUfFqyFMwFNK6LEWq3DcnkJC2Fv8S5i_t4UfoDNDAOzdPWthWbpJtGeWhh07iBIFDtiJTYbJHCWqDTaDKZe3lBKCONL8kQhasYnr92i4yFh8_PKba-Xx7newWKDZBygyM3zXnh_9P5QVOVpX_53fQGeBTWN</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Identifying dependencies of an application upon a given security context</title><source>esp@cenet</source><creator>VERBOWSKI CHAD E ; CHEN SHUO ; DUNAGAN JOHN D ; WANG YI-MIN</creator><creatorcontrib>VERBOWSKI CHAD E ; CHEN SHUO ; DUNAGAN JOHN D ; WANG YI-MIN</creatorcontrib><description>A technique for identifying dependencies of an application upon a given security context includes monitoring security checks generated by the application. The security checks requiring elevated rights are identified and the state of execution of the application corresponding to the identified security checks may be logged. The security checks requiring elevated rights may be identified by monitoring access checks, monitoring privilege checks, checking user/group identifiers against a list of known identifiers associated with elevated rights, or the like.</description><language>eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2007</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20070104&amp;DB=EPODOC&amp;CC=US&amp;NR=2007006283A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20070104&amp;DB=EPODOC&amp;CC=US&amp;NR=2007006283A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>VERBOWSKI CHAD E</creatorcontrib><creatorcontrib>CHEN SHUO</creatorcontrib><creatorcontrib>DUNAGAN JOHN D</creatorcontrib><creatorcontrib>WANG YI-MIN</creatorcontrib><title>Identifying dependencies of an application upon a given security context</title><description>A technique for identifying dependencies of an application upon a given security context includes monitoring security checks generated by the application. The security checks requiring elevated rights are identified and the state of execution of the application corresponding to the identified security checks may be logged. The security checks requiring elevated rights may be identified by monitoring access checks, monitoring privilege checks, checking user/group identifiers against a list of known identifiers associated with elevated rights, or the like.</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2007</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNirEKwkAQBa-xEPUfFqyFMwFNK6LEWq3DcnkJC2Fv8S5i_t4UfoDNDAOzdPWthWbpJtGeWhh07iBIFDtiJTYbJHCWqDTaDKZe3lBKCONL8kQhasYnr92i4yFh8_PKba-Xx7newWKDZBygyM3zXnh_9P5QVOVpX_53fQGeBTWN</recordid><startdate>20070104</startdate><enddate>20070104</enddate><creator>VERBOWSKI CHAD E</creator><creator>CHEN SHUO</creator><creator>DUNAGAN JOHN D</creator><creator>WANG YI-MIN</creator><scope>EVB</scope></search><sort><creationdate>20070104</creationdate><title>Identifying dependencies of an application upon a given security context</title><author>VERBOWSKI CHAD E ; CHEN SHUO ; DUNAGAN JOHN D ; WANG YI-MIN</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2007006283A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2007</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>VERBOWSKI CHAD E</creatorcontrib><creatorcontrib>CHEN SHUO</creatorcontrib><creatorcontrib>DUNAGAN JOHN D</creatorcontrib><creatorcontrib>WANG YI-MIN</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>VERBOWSKI CHAD E</au><au>CHEN SHUO</au><au>DUNAGAN JOHN D</au><au>WANG YI-MIN</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Identifying dependencies of an application upon a given security context</title><date>2007-01-04</date><risdate>2007</risdate><abstract>A technique for identifying dependencies of an application upon a given security context includes monitoring security checks generated by the application. The security checks requiring elevated rights are identified and the state of execution of the application corresponding to the identified security checks may be logged. The security checks requiring elevated rights may be identified by monitoring access checks, monitoring privilege checks, checking user/group identifiers against a list of known identifiers associated with elevated rights, or the like.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US2007006283A1
source esp@cenet
subjects ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title Identifying dependencies of an application upon a given security context
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T16%3A14%3A41IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=VERBOWSKI%20CHAD%20E&rft.date=2007-01-04&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2007006283A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true