Security model for common multiplexed transactional logs
A security model is provided in a transactional logging infrastructure that is arranged as a protected subsystem built on an underlying secure file system. Files in the underlying file system used by virtual log streams are protected from direct user writes, and are written-to only through the prote...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Bradshaw, Dexter P Tipton, William R Groff, Dana Vacheri, Zoheb Lester Alexander |
description | A security model is provided in a transactional logging infrastructure that is arranged as a protected subsystem built on an underlying secure file system. Files in the underlying file system used by virtual log streams are protected from direct user writes, and are written-to only through the protected subsystem that is brokered by a machine-wide principal so that virtual log files sharing the same multiplexed physical log are kept secure from each other. Log file handles and user- and kernel-mode objects are exposed to log clients through interfaces using consistent security semantics for both dedicated and virtual logs. Log clients are agnostic of the underlying secure file system and can only manipulate file system containers-abstract objects that implement the physical log and used to virtualize the file system by normalizing input/output operations-by using the interfaces brokered by the principal in the protected subsystem. |
format | Patent |
fullrecord | <record><control><sourceid>uspatents_EFH</sourceid><recordid>TN_cdi_uspatents_grants_08321667</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>08321667</sourcerecordid><originalsourceid>FETCH-uspatents_grants_083216673</originalsourceid><addsrcrecordid>eNrjZLAITk0uLcosqVTIzU9JzVFIyy9SSM7Pzc3PU8gtzSnJLMhJrUhNUSgpSswrTkwuyczPS8xRyMlPL-ZhYE1LzClO5YXS3AwKbq4hzh66pcUFiSWpeSXF8elATUDKwMLYyNDMzNyYCCUAINov3Q</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Security model for common multiplexed transactional logs</title><source>USPTO Issued Patents</source><creator>Bradshaw, Dexter P ; Tipton, William R ; Groff, Dana ; Vacheri, Zoheb Lester Alexander</creator><creatorcontrib>Bradshaw, Dexter P ; Tipton, William R ; Groff, Dana ; Vacheri, Zoheb Lester Alexander ; Microsoft Corporation</creatorcontrib><description>A security model is provided in a transactional logging infrastructure that is arranged as a protected subsystem built on an underlying secure file system. Files in the underlying file system used by virtual log streams are protected from direct user writes, and are written-to only through the protected subsystem that is brokered by a machine-wide principal so that virtual log files sharing the same multiplexed physical log are kept secure from each other. Log file handles and user- and kernel-mode objects are exposed to log clients through interfaces using consistent security semantics for both dedicated and virtual logs. Log clients are agnostic of the underlying secure file system and can only manipulate file system containers-abstract objects that implement the physical log and used to virtualize the file system by normalizing input/output operations-by using the interfaces brokered by the principal in the protected subsystem.</description><language>eng</language><creationdate>2012</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://image-ppubs.uspto.gov/dirsearch-public/print/downloadPdf/8321667$$EPDF$$P50$$Guspatents$$Hfree_for_read</linktopdf><link.rule.ids>230,308,776,798,881,64012</link.rule.ids><linktorsrc>$$Uhttps://image-ppubs.uspto.gov/dirsearch-public/print/downloadPdf/8321667$$EView_record_in_USPTO$$FView_record_in_$$GUSPTO$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Bradshaw, Dexter P</creatorcontrib><creatorcontrib>Tipton, William R</creatorcontrib><creatorcontrib>Groff, Dana</creatorcontrib><creatorcontrib>Vacheri, Zoheb Lester Alexander</creatorcontrib><creatorcontrib>Microsoft Corporation</creatorcontrib><title>Security model for common multiplexed transactional logs</title><description>A security model is provided in a transactional logging infrastructure that is arranged as a protected subsystem built on an underlying secure file system. Files in the underlying file system used by virtual log streams are protected from direct user writes, and are written-to only through the protected subsystem that is brokered by a machine-wide principal so that virtual log files sharing the same multiplexed physical log are kept secure from each other. Log file handles and user- and kernel-mode objects are exposed to log clients through interfaces using consistent security semantics for both dedicated and virtual logs. Log clients are agnostic of the underlying secure file system and can only manipulate file system containers-abstract objects that implement the physical log and used to virtualize the file system by normalizing input/output operations-by using the interfaces brokered by the principal in the protected subsystem.</description><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2012</creationdate><recordtype>patent</recordtype><sourceid>EFH</sourceid><recordid>eNrjZLAITk0uLcosqVTIzU9JzVFIyy9SSM7Pzc3PU8gtzSnJLMhJrUhNUSgpSswrTkwuyczPS8xRyMlPL-ZhYE1LzClO5YXS3AwKbq4hzh66pcUFiSWpeSXF8elATUDKwMLYyNDMzNyYCCUAINov3Q</recordid><startdate>20121127</startdate><enddate>20121127</enddate><creator>Bradshaw, Dexter P</creator><creator>Tipton, William R</creator><creator>Groff, Dana</creator><creator>Vacheri, Zoheb Lester Alexander</creator><scope>EFH</scope></search><sort><creationdate>20121127</creationdate><title>Security model for common multiplexed transactional logs</title><author>Bradshaw, Dexter P ; Tipton, William R ; Groff, Dana ; Vacheri, Zoheb Lester Alexander</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-uspatents_grants_083216673</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2012</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Bradshaw, Dexter P</creatorcontrib><creatorcontrib>Tipton, William R</creatorcontrib><creatorcontrib>Groff, Dana</creatorcontrib><creatorcontrib>Vacheri, Zoheb Lester Alexander</creatorcontrib><creatorcontrib>Microsoft Corporation</creatorcontrib><collection>USPTO Issued Patents</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Bradshaw, Dexter P</au><au>Tipton, William R</au><au>Groff, Dana</au><au>Vacheri, Zoheb Lester Alexander</au><aucorp>Microsoft Corporation</aucorp><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Security model for common multiplexed transactional logs</title><date>2012-11-27</date><risdate>2012</risdate><abstract>A security model is provided in a transactional logging infrastructure that is arranged as a protected subsystem built on an underlying secure file system. Files in the underlying file system used by virtual log streams are protected from direct user writes, and are written-to only through the protected subsystem that is brokered by a machine-wide principal so that virtual log files sharing the same multiplexed physical log are kept secure from each other. Log file handles and user- and kernel-mode objects are exposed to log clients through interfaces using consistent security semantics for both dedicated and virtual logs. Log clients are agnostic of the underlying secure file system and can only manipulate file system containers-abstract objects that implement the physical log and used to virtualize the file system by normalizing input/output operations-by using the interfaces brokered by the principal in the protected subsystem.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_uspatents_grants_08321667 |
source | USPTO Issued Patents |
title | Security model for common multiplexed transactional logs |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T08%3A09%3A38IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-uspatents_EFH&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Bradshaw,%20Dexter%20P&rft.aucorp=Microsoft%20Corporation&rft.date=2012-11-27&rft_id=info:doi/&rft_dat=%3Cuspatents_EFH%3E08321667%3C/uspatents_EFH%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |