-
公开(公告)号:GB2599043A
公开(公告)日:2022-03-23
申请号:GB202117672
申请日:2020-07-23
Applicant: IBM
Inventor: TIM SCHEIDELER , ARJUN RAGHAVENDRA , MATTHIAS SEUL
IPC: G06F16/13
Abstract: A computer-implemented method for managing access rights to a knowledge graph is provided. The method comprises splitting, for each user system, its respective portion of the knowledge graph into a plurality of knowledge subgraphs, encrypting each of the knowledge subgraphs, and generating a plurality of private summary graphs. The method also comprises maintaining a collaboration graph comprising one vertex per user system and edges representing collaborations between the users, mapping all private subgraphs of all user systems to one public summary graph, each vertex of the public summary graph comprises less data than the related vertex of the related private summary graphs and wherein none of the vertices of the summary graph comprises any encryption or decryption key, and granting access to a selected knowledge subgraph from a first user system to a second user system.
-
公开(公告)号:GB2598214A
公开(公告)日:2022-02-23
申请号:GB202111756
申请日:2020-04-28
Applicant: IBM
Inventor: TIM SCHEIDELER , RAGHAVENDRA ARJUN UDUPI , IVAN JAMES REEDMAN , MATTHIAS SEUL
IPC: H04L9/00
Abstract: A method for processing security events by applying a rule-based alarm scheme may be provided. The method includes generating a rule index of rules and an indicator of compromise index for each of the rules. The method includes also processing the incomingsecurity event by applying the rules, increasing a current rule counter relating to a triggered rule, and increasing a current indicator of compromise counter pertaining to the triggered rule. Furthermore, the method includes generating a pseudo security event from received data about known attacks and related indicators of compromise, processing the pseudo security events by sequentially applying the rules, increasing a current rule counter of pseudo security events, and increasing a current indicator of compromise counter for pseudo security events, and sorting the rules and sorting within each rule the indicator of compromise values in the indicator of compromise index.
-
公开(公告)号:GB2592335A
公开(公告)日:2021-08-25
申请号:GB202108987
申请日:2019-11-22
Applicant: IBM
Inventor: TIM SCHEIDELER , ERIK RUEGER , STEFAN RAVIZZA , FREDERIK FLOETHER
IPC: G06F16/35 , G06F16/901 , G06F16/906
Abstract: A method for partitioning a knowledge graph is provided. The method analyzes past searches and determines an access frequency of a plurality of edges. The method marks, as intermediate cluster cores, edges having the highest access frequencies, sorts the marked 5intermediate cluster cores according to their access frequencies, and selects a first cluster core having the highest access frequency. The method assigns first edges in a first radiusaround the first cluster core to build the first cluster. The method selects a second cluster core having the highest access frequency apart from edges of the first cluster, and assignssecond edges in a second radius around second cluster core to build the second cluster. The 0method partitions the knowledge graph into a first sub-knowledge-graph comprising the first cluster and a second sub-knowledge-graph comprising the second cluster.
-
-