会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Validation of consistency and completeness of access control policy sets
    • 验证访问控制策略集的一致性和完整性
    • US08904472B2
    • 2014-12-02
    • US12945642
    • 2010-11-12
    • Riaz Ahmed ShaikhKamel AdiLuigi LogrippoSerguei Mankovskii
    • Riaz Ahmed ShaikhKamel AdiLuigi LogrippoSerguei Mankovskii
    • G06F17/00G06F21/60
    • G06F21/604
    • Consistency and/or completeness of access control policy sets may be validated and/or verified. An access control policy set may be received. The access control policy set may include access control policies that allow or disallow access to computing resources. Individual ones of the access control policies may include one or more attributes. The one or more attributes of a given access control policy may be ordered into a predetermined order responsive to the one or more attributes of the given access control policy lacking the predetermined order. A decision tree may be generated based on the access control policies. The decision tree may be analyzed to determine one or more of (1) whether one or more of the access control policies are incomplete, or (2) whether one or more of the access control policies are inconsistent with one or more other ones of the access control policies.
    • 访问控制策略集的一致性和/或完整性可以被验证和/或验证。 可以接收访问控制策略集。 访问控制策略集可以包括允许或不允许访问计算资源的访问控制策略。 访问控制策略中的各个可以包括一个或多个属性。 响应于缺少预定顺序的给定访问控制策略的一个或多个属性,给定访问控制策略的一个或多个属性可被排序成预定顺序。 可以基于访问控制策略来生成决策树。 可以分析决策树以确定(1)访问控制策略中的一个或多个是否不完整的一个或多个,或者(2)访问控制策略中的一个或多个与一个或多个其他访问控制策略是否不一致 访问控制策略。
    • 3. 发明申请
    • VALIDATION OF CONSISTENCY AND COMPLETENESS OF ACCESS CONTROL POLICY SETS
    • 一致性验证和访问控制策略集的完整性
    • US20120124639A1
    • 2012-05-17
    • US12945642
    • 2010-11-12
    • Riaz Ahmed SHAIKHKamel AdiLuigi LogrippoSerguei Mankovskii
    • Riaz Ahmed SHAIKHKamel AdiLuigi LogrippoSerguei Mankovskii
    • G06F17/00
    • G06F21/604
    • Consistency and/or completeness of access control policy sets may be validated and/or verified. An access control policy set may be received. The access control policy set may include access control policies that allow or disallow access to computing resources. Individual ones of the access control policies may include one or more attributes. The one or more attributes of a given access control policy may be ordered into a predetermined order responsive to the one or more attributes of the given access control policy lacking the predetermined order. A decision tree may be generated based on the access control policies. The decision tree may be analyzed to determine one or more of (1) whether one or more of the access control policies are incomplete, or (2) whether one or more of the access control policies are inconsistent with one or more other ones of the access control policies.
    • 访问控制策略集的一致性和/或完整性可以被验证和/或验证。 可以接收访问控制策略集。 访问控制策略集可以包括允许或不允许访问计算资源的访问控制策略。 访问控制策略中的各个可以包括一个或多个属性。 响应于缺少预定顺序的给定访问控制策略的一个或多个属性,给定访问控制策略的一个或多个属性可被排序成预定顺序。 可以基于访问控制策略来生成决策树。 可以分析决策树以确定(1)访问控制策略中的一个或多个是否不完整的一个或多个,或者(2)访问控制策略中的一个或多个是否与一个或多个其他访问控制策略不一致 访问控制策略。