METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR ENFORCING PRIVACY POLICIES
    1.
    发明申请
    METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR ENFORCING PRIVACY POLICIES 审中-公开
    用于执行隐私政策的方法,系统和计算机程序产品

    公开(公告)号:WO2008086093A3

    公开(公告)日:2008-09-04

    申请号:PCT/US2008050111

    申请日:2008-01-03

    CPC classification number: G06F21/6218 G06F21/33

    Abstract: A method for enforcing privacy policies associated with data. The method includes accessing a database to identify labeled data in the database, the labeled data associated with a privacy policy (110). An access node accessing the label data is determined (112). For the access node accessing the labeled data, it is determined whether the access node applies an authorization test as indicated by the privacy policy (114). An authorization test is associated with the access node if the access node does not apply necessary authorization indicated by the privacy policy (118).

    Abstract translation: 一种执行与数据相关联的隐私策略的方法。 该方法包括访问数据库以识别数据库中的标记数据,与隐私策略(110)相关联的标记数据。 确定访问标签数据的接入节点(112)。 对于接入节点访问标记的数据,确定接入节点是否应用由隐私策略(114)指示的授权测试。 如果访问节点不应用隐私策略指示的必要授权(118),则授权测试与接入节点相关联。

    MULTI-GRANULARITY HIERARCHICAL AGGREGATE SELECTION BASED ON UPDATE, STORAGE AND RESPONSE CONSTRAINTS
    2.
    发明申请
    MULTI-GRANULARITY HIERARCHICAL AGGREGATE SELECTION BASED ON UPDATE, STORAGE AND RESPONSE CONSTRAINTS 审中-公开
    基于更新,存储和响应约束的多粒度分层聚类选择

    公开(公告)号:WO2013002870A3

    公开(公告)日:2014-05-01

    申请号:PCT/US2012032891

    申请日:2012-04-10

    CPC classification number: G06F17/30551 G06F17/30489

    Abstract: Techniques are disclosed for multi-granularity hierarchical aggregate selection based on update, storage and response constraints. For example, for a temporal hierarchy of aggregation statistics associated with a plurality of database records, wherein the temporal hierarchy comprises two or more aggregation statistics levels and each level has a different temporal granularity associated therewith, a method comprises iteratively modifying the temporal hierarchy to at least one of: (a) minimize a storage usage cost while satisfying a temporal hierarchy update constraint and a query response time constraint; (b) reduce a temporal hierarchy update time and a query response time while satisfying a storage usage constraint; and (c) minimize a query response time for frequently applied queries that do not shift in time while satisfying the storage usage constraint, wherein the resulting temporal hierarchy that achieves at least one of (a), (b) and (c) is identified as an optimal temporal hierarchy.

    Abstract translation: 公开了基于更新,存储和响应约束的多粒度分级聚合选择的技术。 例如,对于与多个数据库记录相关联的聚合统计的时间层级,其中时间层级包括两个或多个聚合统计级别,并且每个级别具有与之相关联的不同时间粒度,一种方法包括将时间层级迭代地修改为 至少一个:(a)在满足时间层次更新约束和查询响应时间约束的同时最小化存储使用成本; (b)在满足存储使用限制的同时减少时间层次更新时间和查询响应时间; (c)最小化在满足存储使用限制的同时不随时间移动的频繁应用的查询的查询响应时间,其中识别达到(a),(b)和(c)中的至少一个的所得到的时间层级, 作为最优时间层级。

    METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR ENFORCING PRIVACY POLICIES
    3.
    发明申请
    METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR ENFORCING PRIVACY POLICIES 审中-公开
    用于执行隐私政策的方法,系统和计算机程序产品

    公开(公告)号:WO2008085809A3

    公开(公告)日:2009-12-23

    申请号:PCT/US2008000008

    申请日:2008-01-02

    CPC classification number: G06F21/6218 G06F21/33

    Abstract: A method for enforcing privacy policies associated with data. The method includes accessing a database to identify labeled data in the database, the labeled data associated with a privacy policy. An access node accessing the label data is determined. For the access node accessing the labeled data, it is determined whether the access node applies an authorization test as indicated by the privacy policy. An authorization test is associated with the access node if the access node does not apply necessary authorization indicated by the privacy policy.

    Abstract translation: 一种执行与数据相关的隐私政策的方法。 该方法包括访问数据库以识别数据库中的标签数据,与隐私策略相关联的标记数据。 确定访问标签数据的接入节点。 对于访问标记数据的接入节点,确定接入节点是否应用由隐私策略指示的授权测试。 如果接入节点没有应用隐私策略所指示的必要授权,则授权测试与接入节点相关联。

    Multi-granularitry hierarchical aggregate selection based on update, storage and response constraints

    公开(公告)号:GB2506800A

    公开(公告)日:2014-04-09

    申请号:GB201400973

    申请日:2012-04-10

    Applicant: IBM

    Abstract: Techniques are disclosed for multi-granularity hierarchical aggregate selection based on update, storage and response constraints. For example, for a temporal hierarchy of aggregation statistics associated with a plurality of database records, wherein the temporal hierarchy comprises two or more aggregation statistics levels and each level has a different temporal granularity associated therewith, a method comprises iteratively modifying the temporal hierarchy to at least one of: (a) minimize a storage usage cost while satisfying a temporal hierarchy update constraint and a query response time constraint; (b) reduce a temporal hierarchy update time and a query response time while satisfying a storage usage constraint; and (c) minimize a query response time for frequently applied queries that do not shift in time while satisfying the storage usage constraint, wherein the resulting temporal hierarchy that achieves at least one of (a), (b) and (c) is identified as an optimal temporal hierarchy.

    Conditional access control
    7.
    发明专利

    公开(公告)号:GB2365561A

    公开(公告)日:2002-02-20

    申请号:GB0030228

    申请日:2000-12-12

    Applicant: IBM

    Abstract: In a multi-user application environment with Java, both codesource access checking and verification of the user who is executing code are employed for access checking. An end user uses a Web browser to access a Web server. An execution thread is established for an end user. The HTTP page and function requested by the user cause the Web application server to invoke a Java Virtual Machine (JVM) which in turn invokes a requested Java servlet. When the Secure Class Loader loads a Java class into the JVM, the code base Uniform URL and the Digital Certificate that was used to sign the class are used by the Secure Class Loader to create the codesource Java object. The JVM includes a Java Security Manager (JSM) class that invokes classes that invoke an underlying system security manager. Conditional access checking includes the capability to control access to resources based on the user and on the Java servlet classes being executed. If the codesource indicated by a Conditional Access List matches the codesource specified in the profile, the system security manager will allow access.

Patent Agency Ranking