DE602005014699D1 - Methode und Vorrichtung zur Gewährleistung von Computersicherheit durch Verwendung eines anpassenden Gittermechanismus - Google Patents

Methode und Vorrichtung zur Gewährleistung von Computersicherheit durch Verwendung eines anpassenden Gittermechanismus

Info

Publication number
DE602005014699D1
DE602005014699D1 DE602005014699T DE602005014699T DE602005014699D1 DE 602005014699 D1 DE602005014699 D1 DE 602005014699D1 DE 602005014699 T DE602005014699 T DE 602005014699T DE 602005014699 T DE602005014699 T DE 602005014699T DE 602005014699 D1 DE602005014699 D1 DE 602005014699D1
Authority
DE
Germany
Prior art keywords
computer security
grid mechanism
adaptive grid
ensuring computer
ensuring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
DE602005014699T
Other languages
English (en)
Inventor
Vincent Joseph Kovarik Jr
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Harris Corp
Original Assignee
Harris Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=34838865&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=DE602005014699(D1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Harris Corp filed Critical Harris Corp
Publication of DE602005014699D1 publication Critical patent/DE602005014699D1/de
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2113Multi-level security, e.g. mandatory access control
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2145Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
DE602005014699T 2004-03-11 2005-03-11 Methode und Vorrichtung zur Gewährleistung von Computersicherheit durch Verwendung eines anpassenden Gittermechanismus Active DE602005014699D1 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US10/798,074 US7302708B2 (en) 2004-03-11 2004-03-11 Enforcing computer security utilizing an adaptive lattice mechanism

Publications (1)

Publication Number Publication Date
DE602005014699D1 true DE602005014699D1 (de) 2009-07-16

Family

ID=34838865

Family Applications (1)

Application Number Title Priority Date Filing Date
DE602005014699T Active DE602005014699D1 (de) 2004-03-11 2005-03-11 Methode und Vorrichtung zur Gewährleistung von Computersicherheit durch Verwendung eines anpassenden Gittermechanismus

Country Status (6)

Country Link
US (1) US7302708B2 (de)
EP (1) EP1577735B1 (de)
JP (1) JP4425819B2 (de)
CN (1) CN100368953C (de)
CA (1) CA2499986C (de)
DE (1) DE602005014699D1 (de)

Families Citing this family (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7616764B2 (en) 2004-07-07 2009-11-10 Oracle International Corporation Online data encryption and decryption
US7596701B2 (en) * 2004-07-07 2009-09-29 Oracle International Corporation Online data encryption and decryption
US7908645B2 (en) * 2005-04-29 2011-03-15 Oracle International Corporation System and method for fraud monitoring, detection, and tiered user authentication
US20070156693A1 (en) * 2005-11-04 2007-07-05 Microsoft Corporation Operating system roles
US8300524B1 (en) 2006-01-30 2012-10-30 Doug Carson & Associates, Inc. Authenticating a data transmission by varying a rate thereof
US8739278B2 (en) 2006-04-28 2014-05-27 Oracle International Corporation Techniques for fraud monitoring and detection using application fingerprinting
US7895639B2 (en) * 2006-05-04 2011-02-22 Citrix Online, Llc Methods and systems for specifying and enforcing access control in a distributed system
US8515912B2 (en) 2010-07-15 2013-08-20 Palantir Technologies, Inc. Sharing and deconflicting data changes in a multimaster database system
US9106422B2 (en) * 2006-12-11 2015-08-11 Oracle International Corporation System and method for personalized security signature
US8214497B2 (en) 2007-01-24 2012-07-03 Mcafee, Inc. Multi-dimensional reputation scoring
US8763114B2 (en) 2007-01-24 2014-06-24 Mcafee, Inc. Detecting image spam
US20080295153A1 (en) * 2007-05-24 2008-11-27 Zhidan Cheng System and method for detection and communication of computer infection status in a networked environment
JP4962162B2 (ja) * 2007-06-21 2012-06-27 富士ゼロックス株式会社 アクセス権管理装置およびプログラム
JP2009259198A (ja) * 2008-03-27 2009-11-05 Hitachi Ltd 情報処理制限システム、情報処理制限装置、および情報処理制限プログラム
US20090320096A1 (en) * 2008-06-24 2009-12-24 Microsoft Corporation Managing access to a health-record
US20090320092A1 (en) * 2008-06-24 2009-12-24 Microsoft Corporation User interface for managing access to a health-record
US20100030874A1 (en) * 2008-08-01 2010-02-04 Louis Ormond System and method for secure state notification for networked devices
US20110010761A1 (en) * 2009-07-09 2011-01-13 Qualcomm Incorporated Connectivity dependent application security for remote devices
US8872828B2 (en) * 2010-09-16 2014-10-28 Palo Alto Research Center Incorporated Method for generating a graph lattice from a corpus of one or more data graphs
US8724911B2 (en) 2010-09-16 2014-05-13 Palo Alto Research Center Incorporated Graph lattice method for image clustering, classification, and repeated structure finding
US9081975B2 (en) 2012-10-22 2015-07-14 Palantir Technologies, Inc. Sharing information between nexuses that use different classification schemes for information access control
US9501761B2 (en) 2012-11-05 2016-11-22 Palantir Technologies, Inc. System and method for sharing investigation results
US9325732B1 (en) * 2014-06-02 2016-04-26 Amazon Technologies, Inc. Computer security threat sharing
EP3975026A1 (de) * 2020-09-28 2022-03-30 Siemens Aktiengesellschaft Verfahren und system zur verwaltung von anlagendaten in einem industriellen netzwerk

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2977476B2 (ja) 1995-11-29 1999-11-15 株式会社日立製作所 機密保護方法
US5887065A (en) * 1996-03-22 1999-03-23 Activcard System and method for user authentication having clock synchronization
US6023765A (en) 1996-12-06 2000-02-08 The United States Of America As Represented By The Secretary Of Commerce Implementation of role-based access control in multi-level secure systems
US5970246A (en) * 1997-09-11 1999-10-19 Motorola Inc. Data processing system having a trace mechanism and method therefor
US6446206B1 (en) 1998-04-01 2002-09-03 Microsoft Corporation Method and system for access control of a message queue
US6345361B1 (en) 1998-04-06 2002-02-05 Microsoft Corporation Directional set operations for permission based security in a computer system
US6405202B1 (en) 1998-04-27 2002-06-11 Trident Systems, Inc. System and method for adding property level security to an object oriented database
US6334121B1 (en) 1998-05-04 2001-12-25 Virginia Commonwealth University Usage pattern based user authenticator
US6408391B1 (en) 1998-05-06 2002-06-18 Prc Inc. Dynamic system defense for information warfare
US6446077B2 (en) 1998-09-21 2002-09-03 Microsoft Corporation Inherited information propagator for objects
US6370648B1 (en) * 1998-12-08 2002-04-09 Visa International Service Association Computer network intrusion detection
US20020138322A1 (en) 2001-03-23 2002-09-26 Katsuyuki Umezawa Secure workflow system and method for the same
WO2003069492A1 (fr) * 2002-02-15 2003-08-21 Science Park Corporation Procede d'authentification individuelle utilisant une caracteristique de saisie sur un appareil de saisie par l'intermediaire d'un reseau, programme associe et support d'enregistrement contenant ce programme
US20030196108A1 (en) 2002-04-12 2003-10-16 Kung Kenneth C. System and techniques to bind information objects to security labels
US7240046B2 (en) * 2002-09-04 2007-07-03 International Business Machines Corporation Row-level security in a relational database management system
US20040107345A1 (en) * 2002-10-21 2004-06-03 Brandt David D. System and methodology providing automation security protocols and intrusion detection in an industrial controller environment
US7454785B2 (en) * 2002-12-19 2008-11-18 Avocent Huntsville Corporation Proxy method and system for secure wireless administration of managed entities
US20040193891A1 (en) * 2003-03-31 2004-09-30 Juha Ollila Integrity check value for WLAN pseudonym

Also Published As

Publication number Publication date
CN100368953C (zh) 2008-02-13
US20050204131A1 (en) 2005-09-15
JP2005259146A (ja) 2005-09-22
CA2499986C (en) 2010-06-29
CA2499986A1 (en) 2005-09-11
EP1577735B1 (de) 2009-06-03
JP4425819B2 (ja) 2010-03-03
CN1667544A (zh) 2005-09-14
EP1577735A2 (de) 2005-09-21
EP1577735A3 (de) 2006-01-11
US7302708B2 (en) 2007-11-27

Similar Documents

Publication Publication Date Title
DE602005014699D1 (de) Methode und Vorrichtung zur Gewährleistung von Computersicherheit durch Verwendung eines anpassenden Gittermechanismus
DE602005018429D1 (de) Vorrichtung, Verfahren, Prozessoranordnung und computerlesbares Datenträgerspeicherprogramm zur Dokumentklassifizierung
DE602006021689D1 (de) Bodenplatte zur Verwendung bei der Massenspektrometrieanalyse sowie Verfahren und Vorrichtung zur Massenspektrometrieanalyse
DE602006007808D1 (de) Vorrichtung, verfahren und verwendung zur behandlung von neuropathie mit stickoxid
DE602005012011D1 (de) Vorrichtung, Methode und rechnerlesbares Aufzeichnungsmedium und Programm zur Informationsverarbeitung
DE602005017318D1 (de) Verfahren und Vorrichtung zum Bereitstellen von Entwurfsdaten
DE602005016196D1 (de) Verfahren, Vorrichtung, System und Komputerprogramm zur Übermittlung von Einstellungsdaten
EP1934884A4 (de) Vorrichtung und verfahren zum einschränken von dateioperationen
DE602006014341D1 (de) Vorrichtung und Verfahren zur Immersionslithographie
ATE524944T1 (de) Verfahren und vorrichtung zur übermittlung von rückstandsinformationen
DK3045545T3 (da) Fremgangsmåde og indretning til karakterisering og tælling af partikler, især biologiske partikler
DE602006013752D1 (de) Vorrichtung und Verfahren zur Verringerung von Denial-of-service Angriffen in Kommunikationsgeräten
ATE510439T1 (de) Verfahren und vorrichtung zum bestimmen, übermitteln und/oder verwenden von verzögerungsinformationen
DE602005004489D1 (de) Verfahren und Vorrichtung zur Bildverarbeitung, Aufzeichnungsmedium und Computerprogramm
DE502006009399D1 (de) Verfahren und vorrichtung zur ausgabe von einparkhinweisen
DE602006011990D1 (de) Vorrichtung, Verfahren und Programm zur Bildverarbeitung
DE602006006952D1 (de) Vorrichtung und Verfahren zur Personenidentifizierung
DE602006007838D1 (de) Verfahren und vorrichtung zur kodierung von videodaten sowie verfahren und vorrichtung zur dekodierung von videodaten
DE602005022123D1 (de) Vorrichtung und verfahren zur beförderung von bohrklein
DE602005005550D1 (de) Verfahren und Vorrichtung zur Ermüdungsprüfung
DE602006003973D1 (de) Verfahren und Vorrichtung zur Wasserbehandlung
DE602005026249D1 (de) Vorrichtung, Verfahren und Computerprogrammprodukt zur Schätzung von Sicherheitsinformationen
DE602004017697D1 (de) Verfahren und Programm zur Ermittlung von Rändern und durch dieses Verfahren verwendetende Vorrichtung
DE602006003274D1 (de) Vorrichtung und Verfahren zur Überprüfung von Gewinden
DE602006011956D1 (de) Verfahren und vorrichtung zur erkennung eines fehlerzustands und zur behebung danach unter verwendung von benutzerkontextinformationen

Legal Events

Date Code Title Description
8364 No opposition during term of opposition