DYNAMIC AUGMENTATION, REDUCTION, AND/OR REPLACEMENT OF SECURITY INFORMATION BY EVALUATING LOGICAL EXPRESSIONS

Method, server, and computer product for modifying base permissions of access control lists (ACL) by evaluating logical expressions (LE). Base permissions are determined for a subject by comparing a name of subject against ACL entries for an object. ACL entries having LE entries are determined. LE e...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: GRANADOS SAHEEM, YAN STANLEY, BRODFUEHRER RICHARD J, BRYANT COREY C
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator GRANADOS SAHEEM
YAN STANLEY
BRODFUEHRER RICHARD J
BRYANT COREY C
description Method, server, and computer product for modifying base permissions of access control lists (ACL) by evaluating logical expressions (LE). Base permissions are determined for a subject by comparing a name of subject against ACL entries for an object. ACL entries having LE entries are determined. LE entries are evaluated to determine which LE entries are true for LE attributes of the subject. Set operators of LE entries are combined to single union ACL, intersect ACL, and replace ACL. Replace operation performed to replace base permissions with replace ACL, resulting in first output. If no replace ACL, base permissions are the first output. Union operation is performed on first output and union ACL, resulting in second output. If no union ACL, first output is second output. Intersect operation performed on second output and intersect ACL, resulting in third output. If no intersect ACL, permissions of second output are the third output.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2011055902A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2011055902A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2011055902A13</originalsourceid><addsrcrecordid>eNqNi8sKwjAURLtxIeo_XHCrmFS6cHlNb2sgTUoeYlelSFz5KNT_x_r4AFczczgzTW55o7GSAjCUFWmPXhq9Akt5EN-KOt8YO5JaoaC3A6YARyJY6RuQujC2-txg3wAdUYVx6RKUKaVABXSqLTk3Cm6eTC7ddYiLX86SZUFeHNaxf7Rx6LtzvMdnG1zKOGdZtmMp8u1_1gszlDg_</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>DYNAMIC AUGMENTATION, REDUCTION, AND/OR REPLACEMENT OF SECURITY INFORMATION BY EVALUATING LOGICAL EXPRESSIONS</title><source>esp@cenet</source><creator>GRANADOS SAHEEM ; YAN STANLEY ; BRODFUEHRER RICHARD J ; BRYANT COREY C</creator><creatorcontrib>GRANADOS SAHEEM ; YAN STANLEY ; BRODFUEHRER RICHARD J ; BRYANT COREY C</creatorcontrib><description>Method, server, and computer product for modifying base permissions of access control lists (ACL) by evaluating logical expressions (LE). Base permissions are determined for a subject by comparing a name of subject against ACL entries for an object. ACL entries having LE entries are determined. LE entries are evaluated to determine which LE entries are true for LE attributes of the subject. Set operators of LE entries are combined to single union ACL, intersect ACL, and replace ACL. Replace operation performed to replace base permissions with replace ACL, resulting in first output. If no replace ACL, base permissions are the first output. Union operation is performed on first output and union ACL, resulting in second output. If no union ACL, first output is second output. Intersect operation performed on second output and intersect ACL, resulting in third output. If no intersect ACL, permissions of second output are the third output.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2011</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20110303&amp;DB=EPODOC&amp;CC=US&amp;NR=2011055902A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20110303&amp;DB=EPODOC&amp;CC=US&amp;NR=2011055902A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>GRANADOS SAHEEM</creatorcontrib><creatorcontrib>YAN STANLEY</creatorcontrib><creatorcontrib>BRODFUEHRER RICHARD J</creatorcontrib><creatorcontrib>BRYANT COREY C</creatorcontrib><title>DYNAMIC AUGMENTATION, REDUCTION, AND/OR REPLACEMENT OF SECURITY INFORMATION BY EVALUATING LOGICAL EXPRESSIONS</title><description>Method, server, and computer product for modifying base permissions of access control lists (ACL) by evaluating logical expressions (LE). Base permissions are determined for a subject by comparing a name of subject against ACL entries for an object. ACL entries having LE entries are determined. LE entries are evaluated to determine which LE entries are true for LE attributes of the subject. Set operators of LE entries are combined to single union ACL, intersect ACL, and replace ACL. Replace operation performed to replace base permissions with replace ACL, resulting in first output. If no replace ACL, base permissions are the first output. Union operation is performed on first output and union ACL, resulting in second output. If no union ACL, first output is second output. Intersect operation performed on second output and intersect ACL, resulting in third output. If no intersect ACL, permissions of second output are the third output.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2011</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNi8sKwjAURLtxIeo_XHCrmFS6cHlNb2sgTUoeYlelSFz5KNT_x_r4AFczczgzTW55o7GSAjCUFWmPXhq9Akt5EN-KOt8YO5JaoaC3A6YARyJY6RuQujC2-txg3wAdUYVx6RKUKaVABXSqLTk3Cm6eTC7ddYiLX86SZUFeHNaxf7Rx6LtzvMdnG1zKOGdZtmMp8u1_1gszlDg_</recordid><startdate>20110303</startdate><enddate>20110303</enddate><creator>GRANADOS SAHEEM</creator><creator>YAN STANLEY</creator><creator>BRODFUEHRER RICHARD J</creator><creator>BRYANT COREY C</creator><scope>EVB</scope></search><sort><creationdate>20110303</creationdate><title>DYNAMIC AUGMENTATION, REDUCTION, AND/OR REPLACEMENT OF SECURITY INFORMATION BY EVALUATING LOGICAL EXPRESSIONS</title><author>GRANADOS SAHEEM ; YAN STANLEY ; BRODFUEHRER RICHARD J ; BRYANT COREY C</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2011055902A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2011</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>GRANADOS SAHEEM</creatorcontrib><creatorcontrib>YAN STANLEY</creatorcontrib><creatorcontrib>BRODFUEHRER RICHARD J</creatorcontrib><creatorcontrib>BRYANT COREY C</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>GRANADOS SAHEEM</au><au>YAN STANLEY</au><au>BRODFUEHRER RICHARD J</au><au>BRYANT COREY C</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>DYNAMIC AUGMENTATION, REDUCTION, AND/OR REPLACEMENT OF SECURITY INFORMATION BY EVALUATING LOGICAL EXPRESSIONS</title><date>2011-03-03</date><risdate>2011</risdate><abstract>Method, server, and computer product for modifying base permissions of access control lists (ACL) by evaluating logical expressions (LE). Base permissions are determined for a subject by comparing a name of subject against ACL entries for an object. ACL entries having LE entries are determined. LE entries are evaluated to determine which LE entries are true for LE attributes of the subject. Set operators of LE entries are combined to single union ACL, intersect ACL, and replace ACL. Replace operation performed to replace base permissions with replace ACL, resulting in first output. If no replace ACL, base permissions are the first output. Union operation is performed on first output and union ACL, resulting in second output. If no union ACL, first output is second output. Intersect operation performed on second output and intersect ACL, resulting in third output. If no intersect ACL, permissions of second output are the third output.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US2011055902A1
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
title DYNAMIC AUGMENTATION, REDUCTION, AND/OR REPLACEMENT OF SECURITY INFORMATION BY EVALUATING LOGICAL EXPRESSIONS
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-22T16%3A22%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=GRANADOS%20SAHEEM&rft.date=2011-03-03&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2011055902A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true