Access control monitoring through policy management
A computing resource service receives a request to access the service and perform various actions. In response to the request, the computing resource service obtains a set of active policies that are applicable to the request. As a result of the service determining that the set of active policies fa...
Gespeichert in:
Hauptverfasser: | , , , , , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Zhao, Kai Wierer, Jeffrey John Sharifi Mehr, Nima Zhang, Chenxi Nagda, Hardik Kruse, William Frederick Hingle Prakash, Bharath Mukkati Chadha, Kunal Rangole, Ashish |
description | A computing resource service receives a request to access the service and perform various actions. In response to the request, the computing resource service obtains a set of active policies that are applicable to the request. As a result of the service determining that the set of active policies fail to provide sufficient permissions for fulfillment of the request, the service determines if an enforcement policy is available that is applicable to the request. The service evaluates the request using the enforcement policy such that if the enforcement policy includes permissions sufficient for fulfillment of the request, the request is fulfilled. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US9948681B1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US9948681B1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US9948681B13</originalsourceid><addsrcrecordid>eNrjZDB2TE5OLS5WSM7PKynKz1HIzc_LLMkvysxLVyjJKMovTc9QKMjPyUyuVMhNzEtMT81NzSvhYWBNS8wpTuWF0twMCm6uIc4euqkF-fGpxQWJyal5qSXxocGWliYWZhaGTobGRCgBAO83LOs</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Access control monitoring through policy management</title><source>esp@cenet</source><creator>Zhao, Kai ; Wierer, Jeffrey John ; Sharifi Mehr, Nima ; Zhang, Chenxi ; Nagda, Hardik ; Kruse, William Frederick Hingle ; Prakash, Bharath Mukkati ; Chadha, Kunal ; Rangole, Ashish</creator><creatorcontrib>Zhao, Kai ; Wierer, Jeffrey John ; Sharifi Mehr, Nima ; Zhang, Chenxi ; Nagda, Hardik ; Kruse, William Frederick Hingle ; Prakash, Bharath Mukkati ; Chadha, Kunal ; Rangole, Ashish</creatorcontrib><description>A computing resource service receives a request to access the service and perform various actions. In response to the request, the computing resource service obtains a set of active policies that are applicable to the request. As a result of the service determining that the set of active policies fail to provide sufficient permissions for fulfillment of the request, the service determines if an enforcement policy is available that is applicable to the request. The service evaluates the request using the enforcement policy such that if the enforcement policy includes permissions sufficient for fulfillment of the request, the request is fulfilled.</description><language>eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2018</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20180417&DB=EPODOC&CC=US&NR=9948681B1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25543,76293</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20180417&DB=EPODOC&CC=US&NR=9948681B1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Zhao, Kai</creatorcontrib><creatorcontrib>Wierer, Jeffrey John</creatorcontrib><creatorcontrib>Sharifi Mehr, Nima</creatorcontrib><creatorcontrib>Zhang, Chenxi</creatorcontrib><creatorcontrib>Nagda, Hardik</creatorcontrib><creatorcontrib>Kruse, William Frederick Hingle</creatorcontrib><creatorcontrib>Prakash, Bharath Mukkati</creatorcontrib><creatorcontrib>Chadha, Kunal</creatorcontrib><creatorcontrib>Rangole, Ashish</creatorcontrib><title>Access control monitoring through policy management</title><description>A computing resource service receives a request to access the service and perform various actions. In response to the request, the computing resource service obtains a set of active policies that are applicable to the request. As a result of the service determining that the set of active policies fail to provide sufficient permissions for fulfillment of the request, the service determines if an enforcement policy is available that is applicable to the request. The service evaluates the request using the enforcement policy such that if the enforcement policy includes permissions sufficient for fulfillment of the request, the request is fulfilled.</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2018</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZDB2TE5OLS5WSM7PKynKz1HIzc_LLMkvysxLVyjJKMovTc9QKMjPyUyuVMhNzEtMT81NzSvhYWBNS8wpTuWF0twMCm6uIc4euqkF-fGpxQWJyal5qSXxocGWliYWZhaGTobGRCgBAO83LOs</recordid><startdate>20180417</startdate><enddate>20180417</enddate><creator>Zhao, Kai</creator><creator>Wierer, Jeffrey John</creator><creator>Sharifi Mehr, Nima</creator><creator>Zhang, Chenxi</creator><creator>Nagda, Hardik</creator><creator>Kruse, William Frederick Hingle</creator><creator>Prakash, Bharath Mukkati</creator><creator>Chadha, Kunal</creator><creator>Rangole, Ashish</creator><scope>EVB</scope></search><sort><creationdate>20180417</creationdate><title>Access control monitoring through policy management</title><author>Zhao, Kai ; Wierer, Jeffrey John ; Sharifi Mehr, Nima ; Zhang, Chenxi ; Nagda, Hardik ; Kruse, William Frederick Hingle ; Prakash, Bharath Mukkati ; Chadha, Kunal ; Rangole, Ashish</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US9948681B13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2018</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Zhao, Kai</creatorcontrib><creatorcontrib>Wierer, Jeffrey John</creatorcontrib><creatorcontrib>Sharifi Mehr, Nima</creatorcontrib><creatorcontrib>Zhang, Chenxi</creatorcontrib><creatorcontrib>Nagda, Hardik</creatorcontrib><creatorcontrib>Kruse, William Frederick Hingle</creatorcontrib><creatorcontrib>Prakash, Bharath Mukkati</creatorcontrib><creatorcontrib>Chadha, Kunal</creatorcontrib><creatorcontrib>Rangole, Ashish</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Zhao, Kai</au><au>Wierer, Jeffrey John</au><au>Sharifi Mehr, Nima</au><au>Zhang, Chenxi</au><au>Nagda, Hardik</au><au>Kruse, William Frederick Hingle</au><au>Prakash, Bharath Mukkati</au><au>Chadha, Kunal</au><au>Rangole, Ashish</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Access control monitoring through policy management</title><date>2018-04-17</date><risdate>2018</risdate><abstract>A computing resource service receives a request to access the service and perform various actions. In response to the request, the computing resource service obtains a set of active policies that are applicable to the request. As a result of the service determining that the set of active policies fail to provide sufficient permissions for fulfillment of the request, the service determines if an enforcement policy is available that is applicable to the request. The service evaluates the request using the enforcement policy such that if the enforcement policy includes permissions sufficient for fulfillment of the request, the request is fulfilled.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US9948681B1 |
source | esp@cenet |
subjects | ELECTRIC COMMUNICATION TECHNIQUE ELECTRICITY TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | Access control monitoring through policy management |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-26T03%3A34%3A40IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Zhao,%20Kai&rft.date=2018-04-17&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS9948681B1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |