Access control monitoring through policy management

A computing resource service receives a request to access the service and perform various actions. In response to the request, the computing resource service obtains a set of active policies that are applicable to the request. As a result of the service determining that the set of active policies fa...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Zhao, Kai, Wierer, Jeffrey John, Sharifi Mehr, Nima, Zhang, Chenxi, Nagda, Hardik, Kruse, William Frederick Hingle, Prakash, Bharath Mukkati, Chadha, Kunal, Rangole, Ashish
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Zhao, Kai
Wierer, Jeffrey John
Sharifi Mehr, Nima
Zhang, Chenxi
Nagda, Hardik
Kruse, William Frederick Hingle
Prakash, Bharath Mukkati
Chadha, Kunal
Rangole, Ashish
description A computing resource service receives a request to access the service and perform various actions. In response to the request, the computing resource service obtains a set of active policies that are applicable to the request. As a result of the service determining that the set of active policies fail to provide sufficient permissions for fulfillment of the request, the service determines if an enforcement policy is available that is applicable to the request. The service evaluates the request using the enforcement policy such that if the enforcement policy includes permissions sufficient for fulfillment of the request, the request is fulfilled.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US9948681B1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US9948681B1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US9948681B13</originalsourceid><addsrcrecordid>eNrjZDB2TE5OLS5WSM7PKynKz1HIzc_LLMkvysxLVyjJKMovTc9QKMjPyUyuVMhNzEtMT81NzSvhYWBNS8wpTuWF0twMCm6uIc4euqkF-fGpxQWJyal5qSXxocGWliYWZhaGTobGRCgBAO83LOs</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Access control monitoring through policy management</title><source>esp@cenet</source><creator>Zhao, Kai ; Wierer, Jeffrey John ; Sharifi Mehr, Nima ; Zhang, Chenxi ; Nagda, Hardik ; Kruse, William Frederick Hingle ; Prakash, Bharath Mukkati ; Chadha, Kunal ; Rangole, Ashish</creator><creatorcontrib>Zhao, Kai ; Wierer, Jeffrey John ; Sharifi Mehr, Nima ; Zhang, Chenxi ; Nagda, Hardik ; Kruse, William Frederick Hingle ; Prakash, Bharath Mukkati ; Chadha, Kunal ; Rangole, Ashish</creatorcontrib><description>A computing resource service receives a request to access the service and perform various actions. In response to the request, the computing resource service obtains a set of active policies that are applicable to the request. As a result of the service determining that the set of active policies fail to provide sufficient permissions for fulfillment of the request, the service determines if an enforcement policy is available that is applicable to the request. The service evaluates the request using the enforcement policy such that if the enforcement policy includes permissions sufficient for fulfillment of the request, the request is fulfilled.</description><language>eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2018</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20180417&amp;DB=EPODOC&amp;CC=US&amp;NR=9948681B1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25543,76293</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20180417&amp;DB=EPODOC&amp;CC=US&amp;NR=9948681B1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Zhao, Kai</creatorcontrib><creatorcontrib>Wierer, Jeffrey John</creatorcontrib><creatorcontrib>Sharifi Mehr, Nima</creatorcontrib><creatorcontrib>Zhang, Chenxi</creatorcontrib><creatorcontrib>Nagda, Hardik</creatorcontrib><creatorcontrib>Kruse, William Frederick Hingle</creatorcontrib><creatorcontrib>Prakash, Bharath Mukkati</creatorcontrib><creatorcontrib>Chadha, Kunal</creatorcontrib><creatorcontrib>Rangole, Ashish</creatorcontrib><title>Access control monitoring through policy management</title><description>A computing resource service receives a request to access the service and perform various actions. In response to the request, the computing resource service obtains a set of active policies that are applicable to the request. As a result of the service determining that the set of active policies fail to provide sufficient permissions for fulfillment of the request, the service determines if an enforcement policy is available that is applicable to the request. The service evaluates the request using the enforcement policy such that if the enforcement policy includes permissions sufficient for fulfillment of the request, the request is fulfilled.</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2018</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZDB2TE5OLS5WSM7PKynKz1HIzc_LLMkvysxLVyjJKMovTc9QKMjPyUyuVMhNzEtMT81NzSvhYWBNS8wpTuWF0twMCm6uIc4euqkF-fGpxQWJyal5qSXxocGWliYWZhaGTobGRCgBAO83LOs</recordid><startdate>20180417</startdate><enddate>20180417</enddate><creator>Zhao, Kai</creator><creator>Wierer, Jeffrey John</creator><creator>Sharifi Mehr, Nima</creator><creator>Zhang, Chenxi</creator><creator>Nagda, Hardik</creator><creator>Kruse, William Frederick Hingle</creator><creator>Prakash, Bharath Mukkati</creator><creator>Chadha, Kunal</creator><creator>Rangole, Ashish</creator><scope>EVB</scope></search><sort><creationdate>20180417</creationdate><title>Access control monitoring through policy management</title><author>Zhao, Kai ; Wierer, Jeffrey John ; Sharifi Mehr, Nima ; Zhang, Chenxi ; Nagda, Hardik ; Kruse, William Frederick Hingle ; Prakash, Bharath Mukkati ; Chadha, Kunal ; Rangole, Ashish</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US9948681B13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2018</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Zhao, Kai</creatorcontrib><creatorcontrib>Wierer, Jeffrey John</creatorcontrib><creatorcontrib>Sharifi Mehr, Nima</creatorcontrib><creatorcontrib>Zhang, Chenxi</creatorcontrib><creatorcontrib>Nagda, Hardik</creatorcontrib><creatorcontrib>Kruse, William Frederick Hingle</creatorcontrib><creatorcontrib>Prakash, Bharath Mukkati</creatorcontrib><creatorcontrib>Chadha, Kunal</creatorcontrib><creatorcontrib>Rangole, Ashish</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Zhao, Kai</au><au>Wierer, Jeffrey John</au><au>Sharifi Mehr, Nima</au><au>Zhang, Chenxi</au><au>Nagda, Hardik</au><au>Kruse, William Frederick Hingle</au><au>Prakash, Bharath Mukkati</au><au>Chadha, Kunal</au><au>Rangole, Ashish</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Access control monitoring through policy management</title><date>2018-04-17</date><risdate>2018</risdate><abstract>A computing resource service receives a request to access the service and perform various actions. In response to the request, the computing resource service obtains a set of active policies that are applicable to the request. As a result of the service determining that the set of active policies fail to provide sufficient permissions for fulfillment of the request, the service determines if an enforcement policy is available that is applicable to the request. The service evaluates the request using the enforcement policy such that if the enforcement policy includes permissions sufficient for fulfillment of the request, the request is fulfilled.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US9948681B1
source esp@cenet
subjects ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title Access control monitoring through policy management
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-26T03%3A34%3A40IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Zhao,%20Kai&rft.date=2018-04-17&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS9948681B1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true