Abstract:
PROBLEM TO BE SOLVED: To provide a method and program for constructing safely managed virtual machine execution environment.SOLUTION: After a program into which means for selectively masking a window screen of a virtual machine and a security function are integrated is installed onto a host OS of a user terminal under the authority of an administrator, a program into which a security function that the administrator wants to introduce into the virtual machine and means for releasing the mask are integrated is provided to a user. Once such a situation is created by the administrator, the user who wants to use a virtualized environment cannot but accept installation of a security function desired by the administrator onto the virtual machine.
Abstract:
PROBLEM TO BE SOLVED: To provide a method, a computer program, an apparatus and a system capable of determining a confidential label of document information in real time.SOLUTION: A label determination apparatus 3 includes: an operation detection section 341 for detecting a predetermined operation on document information; a content extraction section 342 for extracting contents contained in the document information in response to the detection of the predetermined operation; a policy information acquisition section 343 for acquiring policy information indicating a relation between the contents and the confidential label from a policy server 1; and a determination section 344 for determining the confidential label of the document information by determining the confidential label corresponding to the contents on the basis of the policy information acquired by the policy information acquisition section 343 in response to the extraction of the contents by the content extraction section 342.
Abstract:
PROBLEM TO BE SOLVED: To prevent reduction of usability and inhibition of user convenience due to data analysis processing in access control.SOLUTION: Technique for classifying data to perform access control. A first piece of data as a reference for classification is extracted from data to be classified or attributes thereof and is analyzed to determine whether a predetermined first part including data to be classified or the first data belongs to a first classification category. When it is determined that the first part belongs to the category, first access control set is applied to an action to the data to be classified or the first data. When the first access control set is applied and the access control to the action to the data to be classified or the first data is suspended, a second piece of data as a reference for classification is extracted from the data to be classified or attributes thereof and analyzed to determine whether the second data belongs to a second classification category. When it is determined that the second piece of data belongs to a second classification category, a second access control set is applied to the suspended first action.
Abstract:
PROBLEM TO BE SOLVED: To provide a resource protection processing program for protecting resources processed by a computer.SOLUTION: In place of a conventional resource protection processing program, a resource protection processing program realizes following functions in a computer: a preparation function which is a function to prepare multiple definition state transition histories and multiple definition actions associated with each other, and in which each of the definition state transition histories defines state transition histories of the computer for when it executes prescribed access to prescribed resources, and each of the definition actions is defined to be executed when a definition state transits to the next definition state; and an action execution function to select the definition action associated with the corresponding definition state transition history from among the single or multiple definition actions when executing the actual access to the real resources, and executing the selected definition actions.
Abstract:
PROBLEM TO BE SOLVED: To provide a method, program and apparatus capable of determining priorities for efficiently classifying a plurality of documents.SOLUTION: A computer acquires contexts relating to each of a plurality of documents, calculates scan priorities of each of the plurality of documents on the basis of a priority calculation policy determining calculation rules of scan priorities in accordance with a combination of acquired contexts, and stores the plurality of documents into any one of plurality of queues with different timing to process classification in accordance with the scan priorities.
Abstract:
Es wird ein Mittel bereitgestellt, um Informationslecks von einem Datenverteilungsziel zu verhindern. Ein Datenverteilungsserver 20 umfasst eine Datenbank 130, die Zugriffskontroll-Ausführungsmodule 132 bis 138 speichert, um auf einem Client einen Zugriffskontrollmechanismus und eine Ladeeinheit zu realisieren, wobei der Zugriffskontroll-Ausführungsmechanismus an eine Umgebung des Clients anpasst, wobei der Zugriffskontrollmechanismus den Zugriff auf eine Ressource aus einem Prozess auf eine Weise kontrolliert, die von einer gegebenen Richtlinie abhängt, wobei die Ladeeinheit in einem Verteilungspaket enthaltene Verteilungsdaten in einen geschützten Speicherbereich lädt, eine Datenbank 120, um die Verteilungsdaten 124 und eine für die Verteilungsdaten 124 spezifizierte Sicherheitsrichtlinie 122 zu speichern, einen Umgebungserkennungsabschnitt 144, um eine Umgebung eines Clients 30B, der den Empfang von Verteilungsdaten anfordert, zu erkennen, und einen Übertragungsverarbeitungsabschnitt 150, um ein Verteilungspaket 160 zu übertragen, das Verteilungsdaten 162, eine Sicherheitsrichtlinie 164 und ein der Umgebung des Clients 30B entsprechendes Zugriffskontroll-Ausführungsmodul 166 enthält.
Abstract:
Provided is means for preventing information leakage from a data distribution destination. A data distribution server (20) of the present invention includes: a database (130) which stores access control implementation modules (132 to 138), which implement, upon a client, an access control mechanism which controls access to a resource by a process according to an imparted policy corresponding to the environment of the client and a deployment unit for deployment into a storage area in which distributed data included in a distributed package is protected; a database (120), which stores distributed data (124) and a security policy (122) specified for the distributed data (124); an environment detection unit (144) for detecting the environment of a client (30B) which requests receipt of the distributed data; and a transmission unit (150) for transmitting a distributed package (160) which includes distributed data (162), a security policy (164), and an access control-implemented module (166) corresponding to the environment of the client (30B).