Movatterモバイル変換


[0]ホーム

URL:


US20170011226A1 - System and method for access control and identity management - Google Patents

System and method for access control and identity management
Download PDF

Info

Publication number
US20170011226A1
US20170011226A1US15/076,363US201615076363AUS2017011226A1US 20170011226 A1US20170011226 A1US 20170011226A1US 201615076363 AUS201615076363 AUS 201615076363AUS 2017011226 A1US2017011226 A1US 2017011226A1
Authority
US
United States
Prior art keywords
access
function
membership
persona
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/076,363
Inventor
Charles E. Henderson
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Skai Inc
Original Assignee
Skai Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Skai IncfiledCriticalSkai Inc
Priority to US15/076,363priorityCriticalpatent/US20170011226A1/en
Publication of US20170011226A1publicationCriticalpatent/US20170011226A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

In a computer environment, a mechanism for the flow of access by means of derivation is provided. Typically, access rights granted with respect to an access point flow (or derive from) an access provider to an access recipient. Typically, the access provider is a function and the access recipient is a function. The access point may be any object, such as files or functions, to which the access recipient is granted access rights by the access provider. Access is typically represented by a relationship object referencing the access provider function, the access recipient function, and the access point object, and a set of access rights. There are typically different types of access, including read access, right access, and membership access. Therefore, the membership access relationship is typically represented as a subtype of the general/abstract access relationship. Membership is the idea that a first function can gain access to a second function, so that the first function becomes the member of the second function. The membership access relationship (MAR1) maps the access provider role to a function A, maps the access recipient to function B, and maps the access point to function C, wherein, function A is a function doing the membership inviting and therefore providing access (as the access provider), function B is the function being invited and therefore receiving access (as the access recipient), and function C (the access point) is the function into which function B is obtaining membership. When a membership access relationship (MAR1) is created, typically a new associated persona function is generated, representing the new identity created for the access recipient function (function B) while serving as a member of the access point function (function C). Because the persona (persona1) is typically a function, additional rights may be granted to or granted by persona1, such as rights granted by persona1 (as the access provider in a new access relationship) or rights granted to persona1 (as the access recipient in a new access relationship). After a persona (persona1) is created, it may itself be invited by a function 3 to become a member in another function (function 4), thereby creating another membership access relationship (MAR2) in which MAR2's access recipient is persona 1, MAR2's access provider is function 3, and MAR's access point is function 4. A second persona (persona2) is then typically automatically created representing the new membership access (MAR2). Persona2 is then said to derive from persona1, since persona 2 is based on persona1. In this way, identity derivation is provided so that persona1 has a derived persona2 (and persona 2 derives from persona 1). Persona1 may have a plurality of derived personas, including persona2, persona3, and persona4. Since these derived personas are based on the persona1, if persona1 is deleted, persona2, persona3, and persona4 (the derived personas) may also be deleted. So, a new technique is provided by which a function may be invited to participate in a plurality of other functions, wherein each membership “invite” is expressed by a new membership access relationship and each such membership access relationship results in the creation of a new and associated persona. When a persona function is invited to be a member in another function, that in turn generates a membership and a second persona that is derived from the first persona, resulting in identity derivation.

Description

Claims (14)

38. A computer program product for decomposing functions having computer code stored in a tangible storage medium that when read and executed by a computer causes the following steps to be performed in a computer system:
creating a first function, a second function, and a third function;
creating a first identity object with a first associated identifier for the first function, a second identity object with an a second associated identifier for the second function, and a third identity object with a third associated identifier for the third function, wherein each identity object has a separately evolving information set in the computer system;
joining in a membership object the first identity object, the second identity object, and the third function, wherein the first identity object is a membership provider, the second identity object is a membership recipient, and the third function is a membership target, so that the second identity object is a member of the third function,
creating a fourth identity object with an associated fourth identifier that derives from the second identity object, so that the third function is decomposable into a collection of multiple member functions through the creation of additional membership object, accomplishing decomposition of the membership target function through the creation of new membership objects, wherein the newly derived identity object resulting from the new membership is a member function of the membership target function, so that new member functions generate new membership objects, creating an expanding program structure and a collaborative means for interpreting the functional structure of a computer program wherein all of the member functions participate in the interpretation, performing interpretation dynamically at system runtime;
creating separately evolving information sets for the identity objects associated with any of the member functions;
providing immediate access to the member functions the information set of the membership target so that the a member function immediately access and operates on the information set of the membership target;
wherein the member functions are distributable within a single system, throughout a multi-node system, or throughout a distributed graph database system on one or a plurality of machines so that the work of the function may also be distributed; and
applying specific access rights controlling how each of the multiple member functions accesses or operates on the information set of the membership target so that the membership target makes accessible its complete information set or a subset of its information set to its member functions, and so that different subsets of information made be made accessible to each member function.
US15/076,3632010-11-242016-03-21System and method for access control and identity managementAbandonedUS20170011226A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US15/076,363US20170011226A1 (en)2010-11-242016-03-21System and method for access control and identity management

Applications Claiming Priority (4)

Application NumberPriority DateFiling DateTitle
US41688110P2010-11-242010-11-24
US13/304,161US8826407B2 (en)2010-11-242011-11-23System and method for access control and identity management
US14/341,370US20140337999A1 (en)2010-11-242014-07-25System and method for access control and identity management
US15/076,363US20170011226A1 (en)2010-11-242016-03-21System and method for access control and identity management

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US14/341,370ContinuationUS20140337999A1 (en)2010-11-242014-07-25System and method for access control and identity management

Publications (1)

Publication NumberPublication Date
US20170011226A1true US20170011226A1 (en)2017-01-12

Family

ID=46127543

Family Applications (3)

Application NumberTitlePriority DateFiling Date
US13/304,161Expired - Fee RelatedUS8826407B2 (en)2010-11-242011-11-23System and method for access control and identity management
US14/341,370AbandonedUS20140337999A1 (en)2010-11-242014-07-25System and method for access control and identity management
US15/076,363AbandonedUS20170011226A1 (en)2010-11-242016-03-21System and method for access control and identity management

Family Applications Before (2)

Application NumberTitlePriority DateFiling Date
US13/304,161Expired - Fee RelatedUS8826407B2 (en)2010-11-242011-11-23System and method for access control and identity management
US14/341,370AbandonedUS20140337999A1 (en)2010-11-242014-07-25System and method for access control and identity management

Country Status (3)

CountryLink
US (3)US8826407B2 (en)
CA (1)CA2856524A1 (en)
WO (1)WO2012071552A2 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20170329583A1 (en)*2016-05-162017-11-16Tibco Software Inc.Stepback mechanism to develop and diagnose process applications
CN109284598A (en)*2018-07-232019-01-29深圳点猫科技有限公司A kind of method and electronic equipment generating electronic identity card in the education cloud platform page
CN110602068A (en)*2019-08-292019-12-20深圳市新系区块链技术有限公司Data authority management method and related product
US20220201598A1 (en)*2019-04-262022-06-23Yi HouMultitenant network device management
WO2023249688A1 (en)*2022-06-202023-12-28Data Sentinel AI, Inc.Systems, methods, and storage media for verifying data

Families Citing this family (44)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8555378B2 (en)*2009-03-112013-10-08Sas Institute Inc.Authorization caching in a multithreaded object server
US20120180115A1 (en)*2011-01-072012-07-12John MaitlandMethod and system for verifying a user for an online service
US8996548B2 (en)*2011-01-192015-03-31Inmar Analytics, Inc.Identifying consuming entity behavior across domains
WO2012135851A2 (en)*2011-03-312012-10-04Coral Networks, Inc.System and method for the structuring and interpretation of organic computer programs
US8918424B2 (en)*2011-10-312014-12-23Advanced Community ServicesManaging homeowner association messages
JP5868149B2 (en)*2011-12-062016-02-24キヤノン株式会社 Data migration device
KR101295209B1 (en)*2012-02-012013-09-12엔에이치엔(주)Group messaging system, method and computer readable recording medium for providing file sharing through bidirectional interlock with a cloud server
US9460303B2 (en)*2012-03-062016-10-04Microsoft Technology Licensing, LlcOperating large scale systems and cloud services with zero-standing elevated permissions
US20130276069A1 (en)*2012-03-222013-10-17Socialogue, Inc.Internet identity management
US9363270B2 (en)*2012-06-292016-06-07Vce Company, LlcPersonas in application lifecycle management
WO2014147811A1 (en)*2013-03-222014-09-25株式会社 日立製作所File storage system and user data management method
US9378391B2 (en)*2013-10-112016-06-28Centrify CorporationMethod and apparatus for creating switchable desktops with separate authorizations
US10122717B1 (en)2013-12-312018-11-06Open Text CorporationHierarchical case model access roles and permissions
WO2015168203A1 (en)*2014-04-292015-11-05PEGRight, Inc.Characterizing user behavior via intelligent identity analytics
US9405929B1 (en)2014-07-312016-08-02Emc CorporationHierarchical permissions model within a document
US9762585B2 (en)2015-03-192017-09-12Microsoft Technology Licensing, LlcTenant lockbox
US11030332B1 (en)*2015-04-132021-06-08Wells Fargo Bank, N.A.Database controlled web service type architecture
CN106156198B (en)*2015-04-222019-12-27阿里巴巴集团控股有限公司Task execution method and device based on distributed database
US11503035B2 (en)*2017-04-102022-11-15The University Of Memphis Research FoundationMulti-user permission strategy to access sensitive information
US10671747B2 (en)2015-06-022020-06-02Dipankar DasguptaMulti-user permission strategy to access sensitive information
US10931682B2 (en)2015-06-302021-02-23Microsoft Technology Licensing, LlcPrivileged identity management
US9888007B2 (en)*2016-05-132018-02-06Idm Global, Inc.Systems and methods to authenticate users and/or control access made by users on a computer network using identity services
US10542010B2 (en)*2016-05-272020-01-21Microsoft Technology Licensing, LlcAccount verification in deferred provisioning systems
WO2018039774A1 (en)*2016-09-022018-03-08FutureVault Inc.Systems and methods for sharing documents
CN108092945B (en)*2016-11-222022-02-22中兴通讯股份有限公司 Method, device and terminal for determining access authority
US10838819B2 (en)2017-01-182020-11-17Microsoft Technology Licensing, LlcIncluding personal relationship metadata within duplicated resources shared across partitioned storage
US10536465B2 (en)2017-01-182020-01-14Microsoft Technology Licensing, LlcSecurity for accessing stored resources
US10542088B2 (en)2017-01-182020-01-21Microsoft Technology Licensing, LlcModifying data resources within party-partitioned storage areas
US12019684B2 (en)2017-01-182024-06-25Microsoft Technology Licensing, LlcApplication programming interface arranged to interface with a plurality of data sources
CN108255588A (en)*2017-03-132018-07-06平安科技(深圳)有限公司A kind of automation layout method for scheduling task and device
WO2018191195A1 (en)*2017-04-102018-10-18Dipankar DasguptaMulti-user permission strategy to access sensitive information
US10965668B2 (en)2017-04-272021-03-30Acuant, Inc.Systems and methods to authenticate users and/or control access made by users based on enhanced digital identity verification
US11520606B2 (en)*2017-09-222022-12-06Vmware, Inc.Dynamic generation of user interface components based on hierarchical component factories
US10938566B2 (en)2018-08-082021-03-02Keir Finlow-BatesBlockchain based identity and access management
EP3614323A1 (en)*2018-08-202020-02-26Nallian NVApparatus and method for sharing data in a value chain collaboration process
US10698701B1 (en)*2019-06-012020-06-30Apple Inc.User interface for accessing an account
US11343253B2 (en)*2020-05-152022-05-24Slack Technologies, LlcAccess control for private channels in a channel-based discussion system
US11669597B1 (en)*2020-08-242023-06-06Hubbert SmithMulti-party data science collaboration
CN112257104A (en)*2020-10-102021-01-22北京字跳网络技术有限公司 Access control method, device and electronic device
US12141755B2 (en)*2021-02-172024-11-12Atlassian Pty Ltd.Displaying content in a collaborative work environment
US20230342486A1 (en)*2022-04-222023-10-26Tigergraph, Inc.Permissions management for queries in a graph
US20230342217A1 (en)*2022-04-262023-10-26Stripe, Inc.Systems and methods for deploying permissions in a distributed computing system
US20240143816A1 (en)*2022-10-282024-05-02Chanalytics Io, LlcInformation Acquisition, Filtering and Analyzing System and Method
CN118157997B (en)*2024-05-112024-09-20华能信息技术有限公司User authority management method

Citations (34)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5173939A (en)*1990-09-281992-12-22Digital Equipment CorporationAccess control subsystem and method for distributed computer system using compound principals
US6202066B1 (en)*1997-11-192001-03-13The United States Of America As Represented By The Secretary Of CommerceImplementation of role/group permission association using object access type
US6237036B1 (en)*1998-02-272001-05-22Fujitsu LimitedMethod and device for generating access-control lists
US20020026592A1 (en)*2000-06-162002-02-28Vdg, Inc.Method for automatic permission management in role-based access control systems
US20020129135A1 (en)*2000-12-222002-09-12Delany Shawn P.Determining group membership
US20020138543A1 (en)*2000-12-222002-09-26Teng Joan C.Workflows with associated processes
US20020138572A1 (en)*2000-12-222002-09-26Delany Shawn P.Determining a user's groups
US20020138763A1 (en)*2000-12-222002-09-26Delany Shawn P.Runtime modification of entries in an identity system
US20020147746A1 (en)*2000-12-222002-10-10Lee Michele C.Delivering output XML with dynamically selectable processing
US20020152254A1 (en)*2000-12-222002-10-17Teng Joan C.Template based workflow definition
US20020156879A1 (en)*2000-12-222002-10-24Delany Shawn P.Policies for modifying group membership
US20030037044A1 (en)*2001-05-292003-02-20David BorehamEnumerated roles in a directory system
US20030078937A1 (en)*2001-05-292003-04-24David BorehamMethod and system for nesting roles in a directory system
US20030135850A1 (en)*1999-08-162003-07-17Z-Force CorporationSystem of reusable software parts and methods of use
US20040010606A1 (en)*2002-07-112004-01-15Delaney Shawn P.Identifying dynamic groups
US20040010591A1 (en)*2002-07-112004-01-15Richard SinnEmploying wrapper profiles
US20040181578A1 (en)*2003-03-112004-09-16Kim ElmsUnified network resources
US20050021498A1 (en)*2001-05-292005-01-27David BorehamMethod and system for creating and utilizing managed roles in a directory system
US20050044396A1 (en)*2003-08-182005-02-24Matthias VogelManaging access control information
US20050091655A1 (en)*2003-10-242005-04-28Microsoft CorporationAssociating runtime objects with a set and controlling access to resources as a function thereof
US20050097166A1 (en)*2003-10-102005-05-05Bea Systems, Inc.Policy inheritance through nested groups
US20050102510A1 (en)*2003-10-102005-05-12Bea Systems, Inc.Delegation in a distributed security system
US20050251852A1 (en)*2003-10-102005-11-10Bea Systems, Inc.Distributed enterprise security system
US20050257245A1 (en)*2003-10-102005-11-17Bea Systems, Inc.Distributed security system with dynamic roles
US20050262362A1 (en)*2003-10-102005-11-24Bea Systems, Inc.Distributed security system policies
US20050262132A1 (en)*2004-05-212005-11-24Nec CorporationAccess control system, access control method, and access control program
US20050278294A1 (en)*2004-05-202005-12-15Bea Systems, Inc.Systems and methods for a collaboration presence framework
US20060036548A1 (en)*2002-05-152006-02-16Stefan RoeverMethods and apparatus for title protocol, authentication, and sharing
US20080016546A1 (en)*2006-07-132008-01-17Li Tong LDynamic profile access control
US20080109897A1 (en)*2001-07-122008-05-08Moran Anthony SGrouped Access Control List Actions
US20090254392A1 (en)*2006-03-302009-10-08Zander Van SMethod and system for enterprise network access control and management for government and corporate entities
US20100205193A1 (en)*2009-02-112010-08-12Oracle International CorporationSimplifying determination of the groups to which users belong when using dynamic groups
US20110196977A1 (en)*2010-02-052011-08-11Lynch Timothy JDynamic service groups based on session attributes
US8195215B2 (en)*2008-12-182012-06-05Motorola Solutions, Inc.Method and system for forming a communication group for content distribution related to an event

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7698346B2 (en)2003-03-182010-04-13Coral Networks, Inc.Network operating system and method
US20070174429A1 (en)2006-01-242007-07-26Citrix Systems, Inc.Methods and servers for establishing a connection between a client system and a virtual machine hosting a requested computing environment
JP4907482B2 (en)2007-09-272012-03-28株式会社日立製作所 Computer system and file management method

Patent Citations (41)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5173939A (en)*1990-09-281992-12-22Digital Equipment CorporationAccess control subsystem and method for distributed computer system using compound principals
US6202066B1 (en)*1997-11-192001-03-13The United States Of America As Represented By The Secretary Of CommerceImplementation of role/group permission association using object access type
US6237036B1 (en)*1998-02-272001-05-22Fujitsu LimitedMethod and device for generating access-control lists
US20030135850A1 (en)*1999-08-162003-07-17Z-Force CorporationSystem of reusable software parts and methods of use
US20020026592A1 (en)*2000-06-162002-02-28Vdg, Inc.Method for automatic permission management in role-based access control systems
US20020156879A1 (en)*2000-12-222002-10-24Delany Shawn P.Policies for modifying group membership
US7363339B2 (en)*2000-12-222008-04-22Oracle International CorporationDetermining group membership
US20020138763A1 (en)*2000-12-222002-09-26Delany Shawn P.Runtime modification of entries in an identity system
US20020147746A1 (en)*2000-12-222002-10-10Lee Michele C.Delivering output XML with dynamically selectable processing
US20020152254A1 (en)*2000-12-222002-10-17Teng Joan C.Template based workflow definition
US20020129135A1 (en)*2000-12-222002-09-12Delany Shawn P.Determining group membership
US7673047B2 (en)*2000-12-222010-03-02Oracle International CorporationDetermining a user's groups
US20020138572A1 (en)*2000-12-222002-09-26Delany Shawn P.Determining a user's groups
US20020138543A1 (en)*2000-12-222002-09-26Teng Joan C.Workflows with associated processes
US20060195575A1 (en)*2000-12-222006-08-31Oracle International CorporationDetermining a user's groups
US7349912B2 (en)*2000-12-222008-03-25Oracle International CorporationRuntime modification of entries in an identity system
US20050021498A1 (en)*2001-05-292005-01-27David BorehamMethod and system for creating and utilizing managed roles in a directory system
US20030078937A1 (en)*2001-05-292003-04-24David BorehamMethod and system for nesting roles in a directory system
US20030037044A1 (en)*2001-05-292003-02-20David BorehamEnumerated roles in a directory system
US7380271B2 (en)*2001-07-122008-05-27International Business Machines CorporationGrouped access control list actions
US20080109897A1 (en)*2001-07-122008-05-08Moran Anthony SGrouped Access Control List Actions
US20060036548A1 (en)*2002-05-152006-02-16Stefan RoeverMethods and apparatus for title protocol, authentication, and sharing
US20040010606A1 (en)*2002-07-112004-01-15Delaney Shawn P.Identifying dynamic groups
US7613794B2 (en)*2002-07-112009-11-03Oracle International CorporationIdentifying dynamic groups
US20070168530A1 (en)*2002-07-112007-07-19Oracle International CorporationIdentifying dynamic groups
US20040010591A1 (en)*2002-07-112004-01-15Richard SinnEmploying wrapper profiles
US20040181578A1 (en)*2003-03-112004-09-16Kim ElmsUnified network resources
US20050044396A1 (en)*2003-08-182005-02-24Matthias VogelManaging access control information
US20050097166A1 (en)*2003-10-102005-05-05Bea Systems, Inc.Policy inheritance through nested groups
US20050262362A1 (en)*2003-10-102005-11-24Bea Systems, Inc.Distributed security system policies
US20050257245A1 (en)*2003-10-102005-11-17Bea Systems, Inc.Distributed security system with dynamic roles
US20050251852A1 (en)*2003-10-102005-11-10Bea Systems, Inc.Distributed enterprise security system
US20050102510A1 (en)*2003-10-102005-05-12Bea Systems, Inc.Delegation in a distributed security system
US20050091655A1 (en)*2003-10-242005-04-28Microsoft CorporationAssociating runtime objects with a set and controlling access to resources as a function thereof
US20050278294A1 (en)*2004-05-202005-12-15Bea Systems, Inc.Systems and methods for a collaboration presence framework
US20050262132A1 (en)*2004-05-212005-11-24Nec CorporationAccess control system, access control method, and access control program
US20090254392A1 (en)*2006-03-302009-10-08Zander Van SMethod and system for enterprise network access control and management for government and corporate entities
US20080016546A1 (en)*2006-07-132008-01-17Li Tong LDynamic profile access control
US8195215B2 (en)*2008-12-182012-06-05Motorola Solutions, Inc.Method and system for forming a communication group for content distribution related to an event
US20100205193A1 (en)*2009-02-112010-08-12Oracle International CorporationSimplifying determination of the groups to which users belong when using dynamic groups
US20110196977A1 (en)*2010-02-052011-08-11Lynch Timothy JDynamic service groups based on session attributes

Cited By (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20170329583A1 (en)*2016-05-162017-11-16Tibco Software Inc.Stepback mechanism to develop and diagnose process applications
CN109284598A (en)*2018-07-232019-01-29深圳点猫科技有限公司A kind of method and electronic equipment generating electronic identity card in the education cloud platform page
US20220201598A1 (en)*2019-04-262022-06-23Yi HouMultitenant network device management
US11979821B2 (en)*2019-04-262024-05-07Hewlett Packard Enterprise Development LpMultitenant network device management
CN110602068A (en)*2019-08-292019-12-20深圳市新系区块链技术有限公司Data authority management method and related product
WO2023249688A1 (en)*2022-06-202023-12-28Data Sentinel AI, Inc.Systems, methods, and storage media for verifying data

Also Published As

Publication numberPublication date
WO2012071552A3 (en)2012-08-02
US8826407B2 (en)2014-09-02
CA2856524A1 (en)2012-05-31
US20120137360A1 (en)2012-05-31
WO2012071552A2 (en)2012-05-31
US20140337999A1 (en)2014-11-13

Similar Documents

PublicationPublication DateTitle
US8826407B2 (en)System and method for access control and identity management
US10367821B2 (en)Data driven role based security
AU2009322747B2 (en)Secure document management
US8010991B2 (en)Policy resolution in an entitlement management system
Zhang et al.A rule-based framework for role-based delegation and revocation
US9420006B2 (en)Method and system for managing security policies
JP5277251B2 (en) Model-based composite application platform
JP5356221B2 (en) Convert role-based access control policies to resource authorization policies
US10956868B1 (en)Virtual reality collaborative workspace that is dynamically generated from a digital asset management workflow
JP2021509746A (en) Methods, devices, and computer program products that selectively grant permissions to group-based objects in group-based communication systems.
US20090276840A1 (en)Unified access control system and method for composed services in a distributed environment
US9473499B2 (en)Federated role provisioning
Shands et al.Secure virtual enclaves: Supporting coalition use of distributed application technologies
JP2009507275A (en) Dual layer access control list
WO2016026320A1 (en)Access control method and apparatus
Ahmed et al.Security policies in distributed CSCW and workflow systems
Robinson et al.From business process choreography to authorization policies
CherifAccess control models for collaborative applications
US12418542B2 (en)Global control access platform
MunakamiDeveloping an ABAC-based grant proposal workflow management system
Madani et al.C-ABAC: An ABAC based Model for Collaboration in Multi-tenant Environment
Peterkin et al.Role based access control for uddi inquiries
Dewan et al.Towards mixed-initiative access control
ClarkAn introduction to role-based access control
Li et al.Multi-hierarchy and fine-grained task-role-based access control in collaborative environments

Legal Events

DateCodeTitleDescription
STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp