Security model for common multiplexed transactional logs

A security model is provided in a transactional logging infrastructure that is arranged as a protected subsystem built on an underlying secure file system. Files in the underlying file system used by virtual log streams are protected from direct user writes, and are written-to only through the prote...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Bradshaw, Dexter P, Tipton, William R, Groff, Dana, Vacheri, Zoheb Lester Alexander
Format: Patent
Sprache:eng
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Bradshaw, Dexter P
Tipton, William R
Groff, Dana
Vacheri, Zoheb Lester Alexander
description A security model is provided in a transactional logging infrastructure that is arranged as a protected subsystem built on an underlying secure file system. Files in the underlying file system used by virtual log streams are protected from direct user writes, and are written-to only through the protected subsystem that is brokered by a machine-wide principal so that virtual log files sharing the same multiplexed physical log are kept secure from each other. Log file handles and user- and kernel-mode objects are exposed to log clients through interfaces using consistent security semantics for both dedicated and virtual logs. Log clients are agnostic of the underlying secure file system and can only manipulate file system containers-abstract objects that implement the physical log and used to virtualize the file system by normalizing input/output operations-by using the interfaces brokered by the principal in the protected subsystem.
format Patent
fullrecord <record><control><sourceid>uspatents_EFH</sourceid><recordid>TN_cdi_uspatents_grants_08321667</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>08321667</sourcerecordid><originalsourceid>FETCH-uspatents_grants_083216673</originalsourceid><addsrcrecordid>eNrjZLAITk0uLcosqVTIzU9JzVFIyy9SSM7Pzc3PU8gtzSnJLMhJrUhNUSgpSswrTkwuyczPS8xRyMlPL-ZhYE1LzClO5YXS3AwKbq4hzh66pcUFiSWpeSXF8elATUDKwMLYyNDMzNyYCCUAINov3Q</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Security model for common multiplexed transactional logs</title><source>USPTO Issued Patents</source><creator>Bradshaw, Dexter P ; Tipton, William R ; Groff, Dana ; Vacheri, Zoheb Lester Alexander</creator><creatorcontrib>Bradshaw, Dexter P ; Tipton, William R ; Groff, Dana ; Vacheri, Zoheb Lester Alexander ; Microsoft Corporation</creatorcontrib><description>A security model is provided in a transactional logging infrastructure that is arranged as a protected subsystem built on an underlying secure file system. Files in the underlying file system used by virtual log streams are protected from direct user writes, and are written-to only through the protected subsystem that is brokered by a machine-wide principal so that virtual log files sharing the same multiplexed physical log are kept secure from each other. Log file handles and user- and kernel-mode objects are exposed to log clients through interfaces using consistent security semantics for both dedicated and virtual logs. Log clients are agnostic of the underlying secure file system and can only manipulate file system containers-abstract objects that implement the physical log and used to virtualize the file system by normalizing input/output operations-by using the interfaces brokered by the principal in the protected subsystem.</description><language>eng</language><creationdate>2012</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://image-ppubs.uspto.gov/dirsearch-public/print/downloadPdf/8321667$$EPDF$$P50$$Guspatents$$Hfree_for_read</linktopdf><link.rule.ids>230,308,776,798,881,64012</link.rule.ids><linktorsrc>$$Uhttps://image-ppubs.uspto.gov/dirsearch-public/print/downloadPdf/8321667$$EView_record_in_USPTO$$FView_record_in_$$GUSPTO$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Bradshaw, Dexter P</creatorcontrib><creatorcontrib>Tipton, William R</creatorcontrib><creatorcontrib>Groff, Dana</creatorcontrib><creatorcontrib>Vacheri, Zoheb Lester Alexander</creatorcontrib><creatorcontrib>Microsoft Corporation</creatorcontrib><title>Security model for common multiplexed transactional logs</title><description>A security model is provided in a transactional logging infrastructure that is arranged as a protected subsystem built on an underlying secure file system. Files in the underlying file system used by virtual log streams are protected from direct user writes, and are written-to only through the protected subsystem that is brokered by a machine-wide principal so that virtual log files sharing the same multiplexed physical log are kept secure from each other. Log file handles and user- and kernel-mode objects are exposed to log clients through interfaces using consistent security semantics for both dedicated and virtual logs. Log clients are agnostic of the underlying secure file system and can only manipulate file system containers-abstract objects that implement the physical log and used to virtualize the file system by normalizing input/output operations-by using the interfaces brokered by the principal in the protected subsystem.</description><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2012</creationdate><recordtype>patent</recordtype><sourceid>EFH</sourceid><recordid>eNrjZLAITk0uLcosqVTIzU9JzVFIyy9SSM7Pzc3PU8gtzSnJLMhJrUhNUSgpSswrTkwuyczPS8xRyMlPL-ZhYE1LzClO5YXS3AwKbq4hzh66pcUFiSWpeSXF8elATUDKwMLYyNDMzNyYCCUAINov3Q</recordid><startdate>20121127</startdate><enddate>20121127</enddate><creator>Bradshaw, Dexter P</creator><creator>Tipton, William R</creator><creator>Groff, Dana</creator><creator>Vacheri, Zoheb Lester Alexander</creator><scope>EFH</scope></search><sort><creationdate>20121127</creationdate><title>Security model for common multiplexed transactional logs</title><author>Bradshaw, Dexter P ; Tipton, William R ; Groff, Dana ; Vacheri, Zoheb Lester Alexander</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-uspatents_grants_083216673</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2012</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Bradshaw, Dexter P</creatorcontrib><creatorcontrib>Tipton, William R</creatorcontrib><creatorcontrib>Groff, Dana</creatorcontrib><creatorcontrib>Vacheri, Zoheb Lester Alexander</creatorcontrib><creatorcontrib>Microsoft Corporation</creatorcontrib><collection>USPTO Issued Patents</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Bradshaw, Dexter P</au><au>Tipton, William R</au><au>Groff, Dana</au><au>Vacheri, Zoheb Lester Alexander</au><aucorp>Microsoft Corporation</aucorp><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Security model for common multiplexed transactional logs</title><date>2012-11-27</date><risdate>2012</risdate><abstract>A security model is provided in a transactional logging infrastructure that is arranged as a protected subsystem built on an underlying secure file system. Files in the underlying file system used by virtual log streams are protected from direct user writes, and are written-to only through the protected subsystem that is brokered by a machine-wide principal so that virtual log files sharing the same multiplexed physical log are kept secure from each other. Log file handles and user- and kernel-mode objects are exposed to log clients through interfaces using consistent security semantics for both dedicated and virtual logs. Log clients are agnostic of the underlying secure file system and can only manipulate file system containers-abstract objects that implement the physical log and used to virtualize the file system by normalizing input/output operations-by using the interfaces brokered by the principal in the protected subsystem.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_uspatents_grants_08321667
source USPTO Issued Patents
title Security model for common multiplexed transactional logs
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T08%3A09%3A38IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-uspatents_EFH&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Bradshaw,%20Dexter%20P&rft.aucorp=Microsoft%20Corporation&rft.date=2012-11-27&rft_id=info:doi/&rft_dat=%3Cuspatents_EFH%3E08321667%3C/uspatents_EFH%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true