Abstract:
The Custom Access Controller adds a custom security hierarchy to the organizational data in the View Processor of WEBSPHERE Virtual Member Manager. Whenever an entity or application attempts to access a resources the access control engine starts the View Processor to identify the organizational data and assigned security policy for the resource. The assigned security policy is applied to a delegated administration path which is part of the delegated administration hierarchy but includes the appropriate path and security policy for the resource. The delegated administration path is sent to an access control engine that grants or denies access to the resource. A View Processor Interface allows network administrators to create and modify custom security hierarchies.
Abstract:
Systems and methods of confirming an addressee of an email message include receiving an email message addressed to one or more forwarding addresses. At least one email address associated with each of the one or more forwarding addresses is obtained. A potential discrepancy in the email message is detected in response to the at least one obtained email address. Before sending the email message, an alert is issued to a sender of the email message. The alert provides a recommendation regarding whether to continue with sending the email message and identifies content associated with the email message that led to detecting the potential discrepancy.
Abstract:
Policies defining the entitlements to be assigned to a new identity joining a role are automatically generated. An automatic policy assigns a new identity the entitlements commonly owned by a predetermined number of identities in the role, which may be all of the role identities. A conditional policy recommends that a new identity be assigned the non-commonly-owned entitlements associated with the role identity whose non-entitlement attributes most closely match the non-entitlement attributes of the new identity. This may be automatically determined by iterating through a vector that maps the non-commonly-owned entitlements with the non-entitlement attributes of each role identity, comparing the non-entitlement attributes of the new identity to find the closest match. The non-commonly-owned entitlements of that identity are then recommended to be assigned to the new identity, upon approval.
Abstract:
Performance impacting operations (e.g., maintenance operations) performed on a system can, depending on a current state of the system, heavily impact the performance of the system, thus affecting a customer's experience with the system. Functionality can be implemented to control execution of the performance impacting operations based on simulating the impact of executing the operation. Depending on the current state of the system, execution of the maintenance operations can be allowed, deferred, and even blocked. This can ensure that the performance of the system is not compromised.
Abstract:
Policies defining the entitlements to be assigned to a new identity joining a role are automatically generated. An automatic policy assigns a new identity the entitlements commonly owned by a predetermined number of identities in the role, which may be all of the role identities. A conditional policy recommends that a new identity be assigned the non-commonly-owned entitlements associated with the role identity whose non-entitlement attributes most closely match the non-entitlement attributes of the new identity. This may be automatically determined by iterating through a vector that maps the non-commonly-owned entitlements with the non-entitlement attributes of each role identity, comparing the non-entitlement attributes of the new identity to find the closest match. The non-commonly-owned entitlements of that identity are then recommended to be assigned to the new identity, upon approval.
Abstract:
A system to apply persona styles to written communications. The system includes a communication analyzer and a modification engine coupled to the communication analyzer. The communication analyzer identifies an element of original content of a written communication and determines that the element of the original content of the written communication is incompatible with a selected persona style. The selected persona style defines a communication style. The modification engine modifies the original content of the written communication to replace the element of the original content with a substitute element that is compatible with the selected persona style.
Abstract:
The Custom Access Controller adds a custom security hierarchy to the organizational data in the View Processor of WEBSPHERE Virtual Member Manager. Whenever an entity or application attempts to access a resources the access control engine starts the View Processor to identify the organizational data and assigned security policy for the resource. The assigned security policy is applied to a delegated administration path which is part of the delegated administration hierarchy but includes the appropriate path and security policy for the resource. The delegated administration path is sent to an access control engine that grants or denies access to the resource. A View Processor Interface allows network administrators to create and modify custom security hierarchies.
Abstract:
An abstraction layer associates a party-focused object, a security-focused object, or both, with an abstraction object. The party-focused or security focused object has one or more properties. The properties are presented in the abstraction object defined by the mapping schema. The abstraction layer converts a set of repository objects to at least one abstraction object.
Abstract:
A method, program product and apparatus for controlling access to profile information, multi-media resources or social network functions of a first user by a second user not listed on a friend or group listing of the first user. An application retrieves a threshold criteria for access control and social network statistics in response to an attempted access by an entity without an appropriate privilege. The application compares the statistics to the threshold. Then, if the statistics meet the threshold criteria, the application allows access.
Abstract:
A technique for securing selected document content includes receiving, at a printer, an unsecured electronic document. Selected content of the electronic document is then encrypted, with an encryption key, at the printer. A paper document whose content includes the encrypted selected content of the electronic document is then printed. The encrypted selected content of the paper document is unintelligible prior to decryption with a decryption key.